NEWS
- Use CTRL+F as search function in your browser. We will keep this website as simple as it is because people who are interested in the information will find it here!
Latest articles from the last weeks.The updates will be more fequently in the next months if my time permits it.
- Hackers Arrested for Cracking US Army Network by AFP via www.securityweek.com article(09/2014)
- Russian malware used by 'privateer' hackers against Ukrainian government by Tom Fox-Brewster via www.theguardian.com article(09/2014)
- Israel ramps up cyber defense with new national body by David Shamah via www.timesofisrael.com/ article(09/2014)
- Cyber Has a New Look in the U.S. Army by Rita Boland via www.afcea.org article(09/2014)
- The Real Cyber War - The Political Economy of Internet Freedom by Shawn Powers and Michael Jablonski via www.press.uillinois.edu article(09/2014)
- Cyberwar: Not if. Not when. Now. by Charlie Mitchell via http://washingtonexaminer.com article(09/2014)
April/14
- Cyberwar - Bedingt abwehrbereit by Kurt Sagatz via www.tagesspiegel.de article(04/2014)
- Yesterday IDF Thwarted Cyber Attack; Today IDF General Speaks About Future of Cyber Warfare via http://www.idfblog.com article(04/2014)
- U.S. Failure to Clarify Interests in Cyberspace Weakens Deterrence by Eric Sterner via www.worldpoliticsreview.com article(04/2014)
March/14
- Air Force needs support strategy for its six cyber weapons by Joey Cheng via http://defensesystems.com article(03/2014)
- Why hackable industrial controls won't soon improve by Bryan Acohido via http://lastwatchdog.com article(03/2014)
- Targeting Huawei: NSA Spied on Chinese Government and Networking Firm via www.spiegel.de article(03/2014)
- Why There's No Real Cyberwar in the Ukraine Conflict by Jeremy Hsu via article(03/2014)
- UK holds cyberwar game in Churchill's WW2 bunker by Raphael Satter via article(03/2014)
- South Korea's strange cyberwar admission by Joe Boyle via www.bbc.com article(03/2014)
February/14
- Special report: The cyberwar threat from North Korea by Kelley Beaucar Vlahos via www.foxnews.com article(02/2014)
- Is Cyberwar Real? by Barno Limnéll and Thomas Rid via www.foreignaffairs.com article(02/2014)
- Der Cyberkrieg hat längst begonnen by Constanze Kurz und Frank Rieger via www.faz.net article(02/2014)
- Cyberwar-Spezialist soll neuer NSA-Chef werden via www.nzz.ch article(02/2014)
January/14
- If This Is Cyberwar, Where Are All the Cyberweapons? by Paul F. Roberts via www.technologyreview.com article(01/2014)
- Cyberwar Surprise Attacks Get a Mathematical Treatment by John Bohannon via http://news.sciencemag.org article(01/2014)
- France Military To Up Defenses Against Cyberwar by AFP via www.defensenews.com article(01/2014)
- How Scared Should You Be of a Cyberwar? by Alyson Sheppard via www.popularmechanics.com article(01/2014)
- The fifth theater of battle: Cyberwar by Orr Hirschauge via www.haaretz.com article(01/2014)
- REVIEW: How To Think About Cyberwar by Merrit Baer via http://thinkprogress.org article(01/2014)
- Cybersecurity and Cyberwar: A Q and A with Peter Singer by Erik Voeten via www.washingtonpost.com article(01/2014)
- Cyberwar: What People Keep Missing About The Threat by Sydney J. Freedberg Jr. via http://breakingdefense.com article(01/2014)
December/13
- Cyberwar Takes Center Stage in Defense Budget by FOX News via www.military.com article(12/2013)
November/13
- SIEM - das bessere PRISM im Cyberwar? by Michael Sepp und Thomas Mörwald viawww.computerwoche.de article(11/2013)
- Stuxnet also infected the internal network of a Russian nuclear plant by Pierluigi Paganini via http://thehackernews.com article(11/2013)
- Cyber 'war game' to test London banks by via http://articles.timesofindia.indiatimes.com article(11/2013)
- Cyber Storm: Deutsche Behörden, USCYBERCOM, NSA und DHS trainieren Präventiound Abwehrvon Cyberangriffen by Matthias Monroy via https://netzpolitik.org article(11/2013)
- Cyberwar: There's no such thing by Tom via http://tomnichols.net article(11/2013)
October/13
- Space, Cyber-Security To Be Included In US-Japan Defence Guidelines Analysis by K. V. Kesavan via www.eurasiareview.com article(10/2013)
- The Navys newest warship is powered by Linux by Sean Gallagher via http://arstechnica.com article(10/2013)
- UN atomic agency hit by malware attack via www.timeslive.co.za article(10/2013)
- How to fight cyber war? Estonia shows the way by Indrani Bagchi via http://timesofindia.indiatimes.com article(10/2013)
- EU states urged to cooperate on drones, cyber defense by Adrian Croft via www.reuters.com article(10/2013)
- Iran denies assassination in cyber war officer's death by Yaakov Lappin via www.jpost.com article(10/2013)
- Report: Iran's cyberwar commander assassinated by Michael Winter via www.usatoday.com article(10/2013)
- Cyber War Tracking of Hackers Requires Diverse Approach: FireEye by Brian Prince via www.securityweek.com article(10/2013)
- Britain`s new cyberwar strike capabilities may just be political posturing by Leo Mirani via http://qz.com article(10/2013)
- BAE cashes in on state cyber war by jim Armitage via www.independent.co.uk article(10/2013)
September/13
- U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show by Barton Gellmann and Ellen Nakashima via www.washingtonpost.com article(09/2013)
- Brazilian Hackers Mistakenly Attack NASA As Payback For NSA Spying by Agence France Presse via www.businessinsider.com/ article(09/2013)
- Are US and Chinese Cyber Intrusions So Different? by Scott Jasper via http://thediplomat.com article(09/2013)
- Cyber War: Why More May Be Better by Zachary Keck via http://thediplomat.com
- Interview: Does Cyber Terror Need to Be Violent to Be Considered a 'War'? by Justin MacDonnel via http://asiasociety.org
- Unified Military Intelligence Picture helping to dispel the fog of war by DARPA via www.darpa.mil article(09/2013)
- Cyberwar gegen das Heidiland by Catherine Boss and Florian Imbach via www.sonntagszeitung.ch article(09/2013)
- Chinese Military Capable of Jamming U.S. Communications System by Bill Gertz via http://freebeacon.com article(09/2013)
- IDF Hackers Test Readiness In Israel for Cyberattacks by Harel Eilam via www.al-monitor.com article(09/2013)
July/13
- Combatting China's cyber espionage: 'Hit 'em high, hit 'em low,' says Mulvenon by via www.fiercegovernmentit.com article(07/2013)
- Our computers are not going to kill us all: Cyber-war is military fiction by Doug Saunders via www.theglobeandmail.com article(07/2013)
- Across Europe, Nations Mold Cyber Defenses by Tom Kington via www.defensenews.com article(07/2013)
- In his own words: Confessions of a cyber warrior by Roger A. Grimes via www.infoworld.com article(07/2013)
- Iran to hold nationwide cyber maneuver via www.presstv.ir article(07/2013)
- Cyber War 'At Its Gunpowder Moment' Says Ministry Of Defence via www.huffingtonpost.co.uk article(07/2013)
- Beware the Internet and the danger of cyberattacks by Robert J. Samuelson via www.dallasnews.com article(07/2013)
- The Future of U.S. Cyber Command by Jason Healey via http://nationalinterest.org article(07/2013)
- U.S. military realm extends to cyberspace via www.upi.com article(07/2013)
- The cyber-intelligence complex and its useful idiots by Barrett Brown via www.guardian.co.uk article(07/2013)
- Cyberwar: Angriffe auf Industrieanlagen wachsen via http://business.chip.de article(07/2013)
- Blind Fear Of Cyberwar Drives Columnist To Call For Elimination Of The Internet by Mike Masnick via www.techdirt.com article(07/2013)
- Unpacking Cyberwar: The Sufficiency of the Law of Armed Conflict in the Cyber Domain by Kyle Genaro Phillips via www.ndu.edu article(07/2013)
- Egon Bahr: Cyberwar ist kein Kalter Krieg by Ute Welty via www.dradio.de article(07/2013)
June/13
- Pentagon Is Updating Conflict Rules in Cyberspace by Thom Shanker via www.nytimes.com article(06/2013)
- Hiring digital 007s -- A new cyber-industrial complex is rising. Should you worry? via www.economist.com article(06/2013)
- The new Triad -- It's time to found a U.S. Cyber Force by Admiral(ret.) James Stavridis via www.foreignpolicy.com article(06/2013)
- US Offensive Cyberwar Policy by Bruce Schneier via www.schneier.com article(06/2013)
- Taiwan to open new cyberwar unit via http://phys.org article(06/2013)
- Obama gibt Anweisungen für Cyber-War via www.handelsblatt.com article(06/2013)
- Guardian publishes third secret NSA document, on cyberwar by Joe Mullin via http://arstechnica.com article(06/2013)
- Obama orders US to draw up overseas target list for cyber-attacks by Glenn Greenwald and Ewen MacAskill via www.guardian.co.uk article(06/2013)
- US Cyber Commander proposes radical changes to combat cybercrime by Charlie Osborne via www.zdnet.com article(06/2013)
- Silent War by Michael Joseph Gross via www.vanityfair.com article(06/2013)
May/13
- Forget the word 'cyberwar' says Marcus Ranum by Richard Chirgwin via www.theregister.co.uk article(05/2013)
- Jaime Blasco: 'This is the new Cold War' via www.aljazeera.com article(05/2013)
- Preventing a U.S.-China Cyberwar via www.nytimes.com article(05/2013)
- HACKED! by Andrew Fowler and Peter Cronau via www.abc.net.au article(05/2013)
- 'Irrational' hackers are growing U.S. security fear by Jim Finkle via www.reuters.com article(05/2013)
- Cyberwar: Zwischen Science Fiction und gefähricher Realität by Aleander Wilke via http://politik-digital.de article(05/2013)
- Cyber experts fear escalation of attacks by Ros Krasny via www.reuters.com article(05/2013)
- Top general says U.S. under constant cyber attack threat by Andrea Shalal-Esa via www.reuters.com article(05/2013)
- Keep Cyberwar Narrow by Panayotis A. Yannakogeorgos via http://nationalinterest.org article(05/2013)
- U.S. could use cyberattack on Syrian air defenses by Jim Michaels via www.usatoday.com article(05/2013)
- Stuxnet worm aided Iranian nuclear program, researcher says via www.haaretz.com article(05/2013)
- Security plays a key role in Navy's energy grid upgrade by Kathleen Hickey via http://gcn.com article(05/2013)
- Cyberwar and international humanitarian law by Kirthi Jayakumar via www.transconflict.com article(05/2013)
- EXPLOIT SALES: THE NEW DISCLOSURE DEBATE by Dennis Fisher via https://threatpost.com article(05/2013)
- US's 'Cyberwar' Strategy: Making The Public Less Secure In The Name Of 'Security' by Tim Cushing via www.techdirt.com article(05/2013)
- Special Report: U.S. cyberwar strategy stokes fear of blowback by Jonathan Weber and Claudia Parsons via www.reuters.com article(05/2013)
April/13
- U.S. urges China collaboration on cyber intrusions by Christopher Bodeen via www.armytimes.com article(04/2013)
- Is Cyber War the New Cold War? by Trefor Moss via http://thediplomat.com article(04/2013)
- 'We're not winning the war on cyber crime,' MPs told by Danny Palmer via www.computing.co.uk article(04/2013)
- U.S. Eyes Pushback On China Hacking by Siobhan Gorban via http://online.wsj.com article(04/2013)
- China General With Dempsey Compares Cyber-Attack to Nuclear Bomb by Bloomberg News via www.bloomberg.com article(04/2013)
- Stuxnet and the Dawn of Algorithmic Warfare by Jason Healey via www.acus.org article(04/2013)
- Six U.S. Air Force cyber capabilities designated "weapons" by Andrea Shalal-Esa via www.reuters.com article(04/2013)
- Washington's Secret Weapon Against Chinese Hackers by Zachary K. Goldman via www.foreignaffairs.com article(04/2013)
- The French Cyber Defence Reservists Network by Stefano Mele via www.stefanomele.it article(04/2013)
- Arming for Virtual Battle: The Dangerous New Rules of Cyberwar by Thomas Darnstaedt, Marcel Rosenbach and Gregor Peter Schmitz via www.spiegel.de article(04/2013)
March/13
- ANALYSIS: Why we need more troops for escalating cyberwar by Alan Paller and George Boggs via www.usatoday.com article(03/2013)
- Cyber warfare: Where are the limits? by Julian Sanchez via www.aljazeera.com article(03/2013)
- Chinese cyberwar and the US 'myth of scheming' by Graham Webster via www.aljazeera.com article(03/2013)
- Tallinn Manual Interprets International Law in Cyberwar Context by Michael Mimoso via https://threatpost.com article(03/2013)
- Cyberfoo: Israel braces for 'MiniDuke' via www.militaryaerospace.com article(03/2013)
- Tone Down the Cyberwarfare Rhetoric, Expert Urges Congress by Kim Zetter via www.wired.com article(03/2012)
- Israel creates cyberwar unit in Defense Ministry by Yael Bar Hillal via www.worldtribune.com article(03/2013)
- UK's Cyber Security Strategy Seriously Under Funded by David Gilbert via www.ibtimes.co.uk article(03/2013)
- Hackers could be fair game for deadly force, cyberwar experts say by John P. Mello Jr. via www.cso.com.au article(03/2013)
- On US, China, cyber espionage, and cyber war by Zeljka Zorz via www.net-security.org article(03/2013)
- Silicon, Iron and Shadow by David W. Barno via www.foreignpolicy.com article(03/2013)
- The new cyber axis by C. Raja Mohan via www.indianexpress.com article(03/2013)
- Howard Schmidt discusses the executive order on cybersecurity by David Spark via www.tripwire.com article(03/2013)
- Israel Ramps Up Its Cyberdefense Training by Gwen Ackerman via www.businessweek.com article(03/2013)
- Al-Qaeda lacks expertise for cyberwar, expert tells MPs via www.bbc.co.uk article(03/2013)
- Inside the Ring: New cyberwar developments by Bill Gertz via www.washingtontimes.com article(03/2013)
- Security Leader Says U.S. Would Retaliate Against Cyberattacks by Mark Mazetti and David E. Sanger via www.nytimes.com article(03/2013)
- ZTE feels hidden hand of scaremongering by John W. Daly via http://news.techeye.net article(03/2013)
- China calls for cyber rules by Zhao Shengnan and Wu Jiao via http://usa.chinadaily.com.cn article(03/2013)
- Why The U.S. Is Not In A Cyber War by Ian Wallace via www.thedailybeast.com article(03/2013)
- China Calls For End To 'Cyber War' by Kenneth Rapoza via www.forbes.com article(03/2013)
- Chinese cyberwar and the US 'myth of scheming' by Graham Webster via www.aljazeera.com article(03/2013)
- Cyber wars: America's infrastructure faces increased threats by Dave Stancliff via www.times-standard.com article(03/2013)
- Reserve activates cyberspace operations group by Bo Joyner via www.af.mil article(03/2013)
- China cyber offensive triggers high alert by Amy Tian via http://trap.it article(03/2013)
February/13
- Trade War Versus Cyberwar by Anup Ghosh via www.nytimes.com article(02/2013)
- We Need New Rules for Cyberwar by Jody R. Westby via www.nytimes.com article(02/2013)
- We Have an Antiquated Framework by Candace Yu via www.nytimes.com article(02/2013)
- It's a Decision, Not a Conclusion by Martin Libicki via www.nytimes.com article(02/2013)
- The Russian army is preparing for war in cyberspace by Andrei Lvov via http://indrus.in article(02/2013)
- Revealed: Stuxnet "betas" devious alternate attack on Iran nuke program by Dan Goodinvia http://arstechnica.com article(02/2013)
- MINIDUKE -- Cyberwar per PDF by Michael Gessat via http://wissen.dradio.de article(02/2013)
- White House Cracks Down On Cyberespionage by Kelly Jackson Higgins via www.darkreading.com article(02/2013)
- Analysis: The near impossible battle against hackers everywhere by Joseph Menn via www.reuters.com article(02/2013)
- At What Point do Cyber Attacks Turn Into a Conventional War? by Marc Boucher via http://marcboucher.ws article(02/2013)
- Cyberwar: the west started it by Arjen Kamphuis via www.gendo.nl article(02/2013)
- America Is Basically Helpless Against The Chinese Hackers by Michael Kelley and Geoffrey Ingersoll via www.businessinsider.com article(02/2013)
- Executive Order -- Improving Critical Infrastructure Cybersecurity by Office of the Press Secretary via www.whitehouse.gov article(02/2013)
- Defining the Qualities of Cyber Warfare by Jarno Limnéll via www.stonesoft.com article(02/2013)
- Obama executive order seeks better defense against cyber attacks by Alina Selyukh via www.reuters.com article(02/2013)
- TRUSTED INTEGRATED CIRCUITS (TRUST) by DARPA via www.darpa.mil article(02/2013)
- US should take the responsibility to check cyber war by People's Daily Online via http://english.peopledaily.com.cn article(02/2013)
- In Cyberwar, Software Flaws Are A Hot Commodity by Tom Gjelten via www.wbur.org article(02/2013)
- Cyber Fail--The Obama administration's lousy record on cyber security by Thomas Rid via www.newrepublic.com article(02/2013)
- Asymmetrical USG Reactions to Cyber Exploitations and Cyber Attacks by Jack Goldsmith via www.lawfareblog.com article(02/2013)
- I'm cyber-confused by Daniel W. Drezner via http://drezner.foreignpolicy.com article(02/2013)
- Broad Powers Seen for Obama in Cyberstrikes by David Sanger and Thom Shanker via www.nytimes.com article(02/2013)
- Cyber Warfare and Deterrence: Trends and Challenges in Research by Amir Lupovici via http://i-hls.com article(02/2013)
- Cyberwar, out of the shadows via www.washingtonpost.com article(02/2013)
- Towards a coherent international cyberspace policy for the EU by Neelie Kroes via http://europa.eu article(02/2013)
- Stuxnet and the Dangers of Cyberwar by Vincent Manzo via http://nationalinterest.org article(02/2013)
- Danger does not compute in cyber war by David Wroe via www.theage.com.au article(02/2013)
- The Attribution Problem in Cyber Attacks by Dimitar Kostadinov via http://resources.infosecinstitute.com article(02/2013)
- New York Times breach opens anti-virus, attribution debate by Dan Kaplan via www.scmagazine.com article(02/2013)
- Cyberwar - der Krieg im Internet - Was ist heute schon möglich? by Mchael Voss via article(02/2013)
January/13
- U.S. Cyber Force to Grow to 14,000 People by Robert K. Ackerman via www.afcea.org article(01/2013)
- Iran builds up cyber warfare capabilities by upi via www.upi.com article(01/2013)
- Cyber War and the Threat of the Boomerang Effect by Brian Prince via www.securityweek.com article(01/2013)
- Cyber War is Upon Us But Only One Side is Attacking by Constantine von Hoffman via http://blogs.cio.com article(01/2013)
- Putin orders Russian computers to be protected after spy attacks by Steve Gutterman and Thomas Grove via http://uk.reuters.com article(01/2013)
- Invoking Article 51 (self-defense) of the UN Charter in Response to Cyber Attacks I by Dimitar Kostadinov via http://resources.infosecinstitute.com article(01/2013)
- DLD 2013: Der Cyber-Krieg ist nur eine Frage der Zeit by Detlef Borchers via www.heise.de article(01/2013)
- In Syria, the Cyberwar Intensifies by Justin Salhani via www.defensenews.com article(01/13)
- Cyberkrieger unter sich by Mirjam Hauck via www.sueddeutsche.de article(01/2013)
- Cyberwar: Breaching the Kinetic Barrier by Oliver Rochford via www.securityweek.com article(01/2013)
- US General: Iran's Cyber War Machine 'A Force To Be Reckoned With' by Andrea Shalal-Esa via www.businessinsider.com article(01/2013)
- Panetta: Security of NATO networks, 'not sufficient to defend against the cyber threat' by Jorge Benitez via www.acus.org article(01/2013)
- Angst vor dem Cyberwar by Bernd Schöne/ Peter Schmitz via www.searchsecurity.de article(01/13)
- The tripod of cyber attribution via http://seclists.org article(01/13)
- Cyberwar -- Das digitale Schlachtfeld via www.3sat.de article(01/13)
- Stuxnet, Schmitt Analysis, and the Cyber "Use of Force" Debate by Andrew C. Foltz via www.ndu.edu article(01/13)
- Bank Hacks Were Work of Iranians, Officials Say by Nicole Perlroth and Quentin Hardy via www.nytimes.com article(01/13)
- First Strike: US Cyber Warriors Seize the Offensive by Tom Gjelten via www.worldaffairsjournal.org article(01/13)
- Israel preparing Cyber Iron Dome Shield by Mohit Kumar via http://thehackernews.com article(01/13)
- It's global cyber war out there by Christopher Joye via http://afr.com article(01/13)
December/12
- CCC: Cyberpeace statt Cyberwar by Torsten Kleinz via http://blog.zdf.de article(12/2012)
- DOJ Plans To Indict State-Sponsored Cyber Attackers via www.defensenews.com article(12/2012)
- Iran stages cyber warfare drill by AFP via www.rawstory.com article(12/2012)
- The Active Defense Folly: Exploring The Cyberwar Doctrine Debate by Oliver Rochford via www.securityweek.com article(12/2012)
- Bundesregierung sieht sich gegen Cyber-Sicherheitsvorfälle gewappnet via http://heise.de article(12/2012)
- Saudi Aramco says cyber attack targeted kingdom's economy by AL ARABIYA via http://english.alarabiya.net article(12/2012)
- Cyber Security without Cyber War by Mary Ellen OConnell via http://jcsl.oxfordjournals.org article(12/2012)
- Hype and fear via www.economist.com article(12/2012)
- The Fog of Cyberwar by Brandon Valeriano and Ryan Maness via www.foreignaffairs.com article(12/2012)
- Cyber War and Jus in Bello by Bhaskar Sharma via www.foreignpolicyjournal.com article(12/2012)
- Hostile states using cyberwarfare to attack UK infrastructure by Nick Hopkins via www.guardian.co.uk article(12/2012)
- Inside 'Plan X:' The Pentagon’s plan for cyberweapon central by Jeremy A. Kaplan via www.foxnews.com article(12/2012)
- Former spy chief says U.S. has had its cyber '9/11 warning' by Steven Musil via http://news.cnet.com article(12/2012)
November/12
- Cyberattacken: EU erwägt Meldepflicht für Unternehmen bSibylle Gassnery via www.silicon.de article(11/2012)
- Hacker zur Verteidigung des Homeland by Thomas Pany via www.heise.de article(11/2012)
- Getarnte Schaedlinge by Peter Welchering via www.dradio.de article(11/2012)
- Cyberwar and Industrial Controls: A conversation with Ralph Langner by Stewart Baker via www.volokh.com article(11/2012)
- Prove China spy allegations or 'shut up,' ambassador says by Greg Weston via www.cbc.ca article(11/2012)
- Israel facing 'millions' of cyber-attacks over Gaza via www.spacewar.com article(11/2012)
- Singapore's Computer Misuse Act to be renamed Cybersecurity Act by Bryan Tan via www.zdnet.com article(11/2012)
- IT-Gipfel: Deutschland ist sicher - auf bescheidenem Niveau via www.heise.de article(11/2012)
- Österreich: Bundesheer gründet Cyberkriegs-Einheit by Annika Kremer via www.gulli.com article(11/2012)
- Kampf gegen Hacker: Telekom rüstet im Cyberkrieg auf by Arndt Ohler via www.ftd.d article(11/2012)
- Stuxnet goes out of control: Chevron infected by anti-Iranian virus, others could be next via https://rt.com article(11/2012)
- The Day A Computer Virus Came Close To Plugging Gulf Oil by Parmy Olsen via www.forbes.com article(11/2012)
- U.S. Cyber Commander: Threats Are Relentless, Education Is The Key by Chad Berndtson via www.crn.com article(11/2012)
- From Sudan to cyber, secret war with Iran heats up by Peter Apps via www.reuters.com article(11/2012)
- Following Sandy, DHS seeks security Cyber Reserve by Taylor Armerding via www.csoonline.com article(11/2012)
- Cyber warfare is key priority for Israel by Samira Shackle via www.middleeastmonitor.com article(11/2012)
October/12
- Expert Warns of the Growing Trade in Software Security Exploits by Divya Subrahmanyam via www.law.harvard.edu article(10/2012)
- Huawei security chief says embracing its hacker critics by Alex Richardson via www.reuters.com article(10/2012)
- Profisoldaten als Schutzschild im Cyberwar? by Werner Fasslabend via http://derstandard.at article(10/2012)
- The Global Cyber Warfare Room Operating from Herzliya by Ami Rojkes Dombe via www.israeldefense.com article(10/2012)
- Dutch Government Proposes Cyberattacks Against... Everyone via www.eff.org article(10/2012)
- DDoS Attacks Against Banks Raise Question: Is This Cyberwar? by Ellen Messmer via www.cio.com
- In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back by Nicole Perlroth via www.nytimes.com
- Iran rejects UN criticism of its cyber security rules by Louis Charbonneau via www.reuters.com article(10/2012)
- The Cyber Trade War by Adam Segal via www.foreignpolicy.com article(10/2012)
- A Stuxnet Future? Yes, Offensive Cyber-Warfare is Already Here by Mihoko Matsubara via www.isn.ethz.ch article(10/2012)
- Tomgram: Karen Greenberg, Preparing for a Digital 9/11 by Karen J. Greenberg via www.tomdispatch.com article(10/2012)
- We Came In Peace They Dont: Hackers vs. CyberWar by FX via http://blog.deepsec.net article(10/2012)
- U.S. Cyber Experts: Deterrence Not Enough by ZACHARY FRYER-BIGGS via www.defensenews.com article(10/2012)
- Indien will 500.000 IT-Experten gegen Cyberattacken ausbilden via www.heise.de article(10/2012)
- Bomben gegen Cyber-Krieger via www.spiegel.de article(10/2012)
- How real is the threat of cyberwar? by via www.aljazeera.com article(10/2012)
September/12
- War in Cyberspace is about Definitions by Joel Harding via http://www.infosecisland.com article(09/2012)
- Researchers unravel Flame's secrets by fab via www.h-online.com article(09/2012)
- Software und Hardware in Cyberkonflikten by Florian Grunert via www.heise.de article(09/2012)
- Deterring Cyberthreats by Jarno Limnell via article(09/2012)
- U.S. official says cyberattacks can trigger self-defense rule by Ellen Nakashima via www.washingtonpost.com article(09/2012)
- Cyberwar-Kriegsführung im Netz by Insa Moog via www.wdr5.de article(09/2012)
- Applying Military Doctrine to Cyberspace: Areas of Operation, Influence and Interest by Matthew Stern via www.securityweek.com article(09/2012)
- Cyberwar and the Threat to Civilization by RICHARD SILVERSTEIN via www.richardsilverstein.com article(09/2012)
- DARPA Selects Rockwell Collins to Lead Cyber Security Program for Unmanned Air Vehicles by Rockwell Collins via www.defpro.com article(09/2012)
- Scandinavia wants cyberwar weapons by Jorge Benitez via www.acus.org article(09/2012)
- Huawei denies spying, calls for global security standards by Neil McAllister via www.theregister.co.uk article(09/2012)
- Clinton urges greater cooperation with China on cybersecurity by Greg Slabodkin via www.fiercegovernmentit.com article(09/2012)
- IT-Sicherheit setzt mobilen Lösungen enge Grenzen by via www.afcea.de article(09/2012)
- Huawei Calls for Cybersecurity Cooperation by JOE McDONALD via http://abcnews.go.com article(09/2012)
- Napolitano calls for cybersecurity intelligence information sharing by Eric B. Parizo via http://searchsecurity.techtarget.com article(09/2012)
- Cyber Weapons: A New Kind of Warfare by Jorge Benitez via www.acus.org article(09/2012)
- Roundtable Dutch Cyber Warfare Community by Nyenrode Business Universiteit via www.nyenrode.nl article(09/2012)
- Taiwan to step up cyberwar capabilities: report by afp via http://phys.org article(09/2012)
August/12
- Air Force Openly Seeking Cyber-Weapons by Brian Donohue via https://threatpost.com article(08/2012)
- Degrade, Disrupt, Deceive: U.S. Talks Openly About Hacking Foes by Noah Shachtman via www.wired.com article(08/2012)
- Die Schlachtfelder von morgen by Johannes Korge via www.spiegel.de article(08/2012)
- U.S. General Confirms Use of Cyber-Attacks in Afghanistan by Craig Blaha via http://technorati.com article(08/2012)
- Is An International Cyber Regulatory Agency Needed? by Richard Stiennon via www.forbes.com article(08/2012)
- Mobile Computing und Cyber Defence by Afcean via www.afcea.de article(08/2012)
- Gov 2.0 and Cyberwar Mashup by Alan W. Silberberg via www.huffingtonpost.com article(08/2012)
- National Cyber Security Framework Manual by ccdcoe via http://ccdcoe.org article(08/2012)
- Cyber-Krieg ist längst Realitaet Elke von Rekowski via www.crn.d article(08/2012)
- Darpa wünscht intuitiv verstehbare Visualisierung des Cyber-Schlachtfelds by Florian Rötzer vi www.heise.de article(08/2012)
- Darpa Looks to Make Cyberwar Routine With Secret Plan X by Noah Shachtman via www.wired.com article(08/2012)
- How the Prospect of Cyber-War Is Shaping International Law by Jacob via http://secureworldpost.secureworldexpo.com
- Cyber threat warnings grow louder via http://fcw.com
- UK's first cyber security camp aims to train an army of cyber warriors by Lee Bell via www.theinquirer.net
- Digitale Landsknechte gesucht by CONSTANZE KURZ via www.faz.net article(08/2012)
- Cyberwar und Voelkerrecht by Ronen Steinkeund Robin Geiss via www.sueddeutsche.de article(08/2012)
- Operativ auf der Hoehe via www.german-foreign-policy.com article(08/2012)
- China's Huawei Responds to US Hackers by www.securityweek.com via article(08/2012)
July/12
- Expert: Huawei routers are riddled with vulnerabilities by Elinor Mills via www.cnet.com article(07/2012)
- Cybersecurity Pipe Dreams by Jorge Benitez and Jason Healey via http://nationalinterest.org article(07/2012)
- DHS issues warning on widely used industrial control system software by Julie Bird via www.fiercegovernmentit.com article(07/2012)
- UK admits to cyber attack on Iran via http://presstv.com article(07/2012)
- Israel's Businesses Losing the Cyber War by Joshua Mitnick via http://online.wsj.com article(07/2012)
- Rules of Cyberwar Stumping Pentagon by Lolita C. Baldor via www.newsfactor.com article(07/2012)
- Ten Thousand Satellite Modems for Disaster Recovery Organizations by Dean Hirasawa via www.thefreelibrary.com article(07/2012)
- New Air Force Mission: Cyberwar Belongs to Us by THOMAS P. M. BARNETT via http://battleland.blogs.time.com article(07/2012)
- Raytheon entwickelt Software für Cyber-Mnoever article(07/2012)
- GAO: Aligning Electronic and Cyber Warfare Operations via article(07/2012)
June/12
- Information Security Governance Wiki via https://cyber.law.harvard.edu article(06/2012)
- NATO And Cyber WarFare by gatomalo via http://uscyberlabs.com article(06/2012)
- Stuxnet cyberweapon set to stop operating by Mark Clayton via www.csmonitor.com article(06/2012)
- Der Cyberwar hat begonnen by Dr. Sandro Gaycken via www.handelsblatt.com article(06/2012)
- Cyberwar - Realität oder nicht ? by Dr. SandroGaycken via http://diskurs.dradio.de article(06/2012)
- Operation Olympic Games, Project X, and the assault on the IT security industry by Richard Stiennon via www.forbes.com article(06/2012)
- Der Einsatz der digitalen Bombe by Markus Zottler via www.kleinezeitung.at article(06/2012)
- Back to Stuxnet: the missing link by Aleks via www.securelist.com article(06/2012)
- 'Proof' Links Flame, Stuxnet Super Cyber Weapons: Researchers by Lee Ferran and Kirit Radia via http://abcnews.go.com article(06/2012)
- McCain Promotes Offensive Cyber Capabilities by Steven Aftergood via www.fas.org article(06/2012)
- German Defense Ministry Announces Cyber Warfare Unit by Jeff Goldman via www.esecurityplanet.com article(06/2012)
- International Cyberwar Treaty Would Quickly Be Hacked to Bits by Jon Lindsay via www.usnews.com article(06/2012)
- Cyberwar: Die Angst vor der 14-Byte-Bombe by Ralf Pauli via http://politik-digital.de article(06/2012
- Cyber Combat: Act of War by Siobhan Gorman via http://online.wsj.com article(06/2012)
- Is It Possible to Wage a Just Cyberwar? by Patrick Lin, Fritz Allhoff and Neil Rowe via www.theatlantic.com article(06/2012)
- Reinsalu: NATO Needs Cyber Deterrence by Erkki Sivonen via http://news.err.ee article(06/2012)
- "Hacker in Uniform" offenbar einsatzbereit via www.tagesschau.de article(06/2012)
- Relax hackers! NATO has no cyber-attack plans - top brass by John Leyden via www.theregister.co.uk article(06/2012)
- Stuxnet's origins decoded: Now we know who did it, but what does it mean? by David P. Fidler via http://phys.org article(06/2012)
- Cyber war puts civilians on the front line by Marcus Ranum via www.scmagazine.com.au article(06/2012)
- Cyber search engine Shodan exposes industrial control systems to new risks by Robert O'Harrow Jr. via www.washingtonpost.com article(06/2012)
- Understanding cyberspace is key to defending against digital attacks by Robert O'Harrow Jr. via www.washingtonpost.com article(06/2012)
- Energy assets in front line of cyber war by Daniel Fineren via www.reuters.com article(06/2012)
- Expert Issues a Cyberwar Warning by ANDREW E. KRAMER and NICOLE PERLROTH via www.nytimes.com article(06/2012)
- Finance Services Leaders Appeal for Limited Government Aid to Fight Cyber Attacks by Kenneth Corbin via www.cio.com article(06/2012)
- Flame: UN urges co-operation to prevent global cyberwar by Dave Lee via www.bbc.com article(06/2012)
- Government role in Stuxnet could increase attacks against U.S. firms by Jaikumar Vijayan via www.computerworld.com article(06/2012)
- Can the White House declare a cyberwar? by Jennifer Martinez and Jonathan Allen via www.politico.com article(06/2012)
- Obama order sped up wave of cyberattacks against Iran by David E. Sanger via www.msnbc.msn.com article(06/2012)
- Latest news on my Hardware Security Research by Sergei Skorobogatov via www.cl.cam.ac.uk article(06/2012)
- Cybersecurity Wiki: Introduction and Call for Assistance by Jack Goldsmith via www.lawfareblog.com article(06/2012)
May/12
- UN agency plans major warning on Flame virus risk via www.reuters.com article(05/2012)
- Superwaffe für Cyberkrieg 2.0: Bedrohlicher Computer-Virus Flame ruft die UN auf den Pln via www.focus.de article(05/2012)
- Chinese general calls for international cyber space rules via http://news.xinhuanet.com article(05/2012)
- Security researcher: I found secret reprogramming backdoors in Chinese microprocessors by Cory Doctorow via http://boingboing.net article(05/2012)
- BSI sieht in Flame keine Superwaffe im Cyberwar via www.handelsblatt.com article(05/2012)
- Auf Stuxnet folgt Flame -- CCC-Sprecher Andreas Bogk untersucht den Computervirus Flame by via http://wissen.dradio.de article(05/2012)
- Security and Defense: Israel's Cyber Ambiguity by YAAKOV KATZ via www.jpost.com article(05/2012)
- U.S. must strut cyber might to stop attacks, Cartwright says by Aliya Sternstein via www.nextgov.com article(05/2012)
- A Conversation on Cyber Strategy with General James E. Cartwright via www.gwumc.edu article(05/2012)
- Wording in cyberwar bill begs question: Who's in charge? by Elinor Mills via http://news.cnet.com article(05/2012)
- Dutch MoD Innovation Competition 2012: "CYBER Operations 2.0" by Matthijs R. Koot via http://blog.cyberwar.nl article(05/2012)
- nationalsecuritylaw upcoming event: CYBER WAR AND INTERNATIONAL LAW CONFERENCE, NAVAL WAR COLLEGE 25-27 article 2012 article(05/2012)
- Unannounced war on Iran by Adel Safty via http://gulfnews.com article(05/2012)
- U.S. Cyber Command Using Classified Intel To Scare CEOs To Action by Paul Roberts via https://threatpost.com article(05/2012)
- U.S., China pledge cooperation on cyberwar by Don Reisinger via http://news.cnet.com article(05/2012)
- Cyber Briefings 'Scare The Bejeezus' Out Of CEOs by TOM GJELTEN via www.npr.org article(05/2012)
- Canada's Vulnerability to Bombs Made of Bits and Bytes by Sheryl Saperia via www.huffingtonpost.ca article(05/2012)
- The Art of Cyberwar II by Kennteth Geers viawww.internetevolution.com article(05/2012)
April/12
- Cyberwar: Die neue Front by Seymour M. Hersh via www.blaetter.de article(04/2012)
- The Netherlands joins the CCDCOE article(04/2012)
- Cyber war and peace by Joseph S Nye via www.aljazeera.com article(04/2012)
- The West "will lose" the cyber war by Jill Dougherty via http://security.blogs.cnn.com article(04/2012)
- Researchers Show How Easy a New Stuxnet-Like Attack Can Be by Arik Hesseldahl via http://allthingsd.com article(04/2012)
- Air Force Space Command vice commander discusses cyberspace, cyber operations by Capt. Brooke Brander via www.afspc.af.mil article(04/2012)
- Experten diskutieren Bedrohungslage im Cyberwar via http://heise.de article(04/2012)
- Officials Examine the Militarization of Cyberspace via www.infosecisland.com article(04/2012)
- Militarisation of cyberspace: how the global power struggle moved online by Nick Hopkins via www.guardian.co.uk article(04/2012)
- US and China engage in cyber war games by Nick Hopkins via www.guardian.co.uk article(04/2012)
- Pentagon to fast-track cyberweapons acquisition by Ellen Nakashima via www.washingtonpost.com article(04/2012)
- Cyber-threats to US allies hamstring future cooperation by Carlo Munoz via www.thehill.com article(04/2012)
- Global cyber arms race engulfing Web - Defense official by David Alexander via www.reuters.com article(04/2012)
- Nye: Cyber war and peace by Joseph Nye via http://globalpublicsquare.blogs.cnn.com article(04/2012)
- Geeks become militarys new warriors by Jeanette Steele via www.utsandiego.com article(04/2012)
- Cyber war threat and world peace by Joseph S. Nye via http://gulfnews.com article(04/2012)
- Keys to cyber defense: Internal info sharing, skilled staff by Henry Kenyon via http://gcn.com article(04/2012)
- Full-range arsenal, portfolio approach necessary for cyber defense by Amber Corrin via http://fcw.com article(04/2012)
- 'Lack of cohesion' in UK cyber security, warns former GCHQ/CESG head by Stuart Summer via www.computing.co.uk article(04/2012)
- Doom and gloom: on hackers, China and cyberwar by Levi Sumagaysay via http://blogs.siliconvalley.com article(04/2012)
- The boomerang effect: Could American cyberweapon be turned against us? by eremy A. Kaplan and Alec Liu via www.foxnews.com article(04/2012)
- Cyberwar: don't believe the hype by Stilgherrian via www.zdnet.com.au article(04/2012)
- Cyberattacks: America’s Achilles Heel by Brad Macdonald via www.thetrumpet.com article(04/2012)
- The Conversation: Time to mobilize for cyberwar by Marvin Ammori and Luke Pelican via www.sacbee.com article(04/2012)
- The big target in cyber war isn't military anymore by William Jackson via http://gcn.com article(04/2012)
- Digital defenses -- Cybersecurity expert Hathaway discusses risks of modern digital world by Lauren Pitruzzello via www.udel.edu article(04/2012)
- DoD expanding collective cyber self-defense beyond NATO via http://www.infosecurity-magazine.com article(04/2012)
March/12
- On Cyberwar Hype by Bruce Schneier via www.schneier.com article(03/2012)
- Expert warns on cyberwar threat via www.upi.com article(03/2012)
- Signals intelligence Former CIA, NSA director shares his perceptions of 'electronic underworld' by Lauren Pitruzzello via www.udel.edu article(03/2012)
- Iran and the era of cyber infection by Dominic Basulto via www.washingtonpost.com article(03/2012)
- NATO Rapid Reaction Team to fight cyber attack by NATO via www.nato.int article(03/2012)
- China testing cyber-attack capabilities, report says by Ellen Nakashima via www.washingtonpost.com article(03/2012)
- Acts of war in cyberspace will likely also be war crimes, says Ranum by Molly Bernhart Walker via www.fiercegovernmentit.com article(03/2012)
- Cyber Command Lawyer Praises Stuxnet, Disses Chinese Cyber Stance by Sydney J. Freedberg Jr. via http://defense.aol.com article(03/2012)
- Cyber war depending on M.A.D deterrent by Nick Farrell via http://news.techeye.net article(03/2012)
- Panetta: U.S. not prepared for cyber attacks by Joel Gehrke via www.newsok.com article(03/2012)
- Cyber War: "Die Tage des dezentralen Internets sind vorbei" by Annika Kremer via www.gulli.com article(03/2012)
- Fmr. CIA head calls Stuxnet virus "good idea" via www.cbsnews.com article(03/2012)
February/12
- When is a cyberattack a matter of defense? by Ellen Nakashima via www.washingtonpost.com article(02/2012)
- Researchers suggest U.S, China engage on cyberattack issues by Aliya Sternstein via www.nextgov.com article(02/2012)
- Report: NATO Needs More Cyber Capabilities by Josh Smith via www.nationaljournal.com article(02/2012)
- Cyber Warfare: The War Of Words by Gerhard Adam via www.science20.com article(02/2012)
- Cyber War Games: U.S. Versus China with David Wise via www.bigthink.com article(02/2012)
- Cyberwar Is Already Upon Us But can it be controlled? by John Arquillia via www.forgeinpolicy.com article(02/2012)
- Think Again: Cyberwar -- Don't fear the digital bogeyman. Virtual conflict is still more hype than reality by Thomas Rid via www.forgeinpolicy.com article(02/2012)
- Cyber Warfare More Likely Than Nukes by Bradley Blakeman via www.newsmax.com article(02/2012)
- The cyber-weapons paradox: 'They're not that dangerous' by Anna Leach via www. theregister.co.uk article(02/2012)
- Cyber arms race, too many shadows on the future via www.securityaffairs.com article(02/2012)
- Langners Stuxnet Deep Dive S4 Video by Dale G Peterson via www.digitalbond.com article(02/2012)
- U.S. Logs On For Cyberwar With Differing Strategies by Suzanne Kelly and Pam Benson via www.thebostonchannel.com article(02/2012)
- NIST and state of Maryland establish cybersecurity lab by Aliya Sternstein via www.nextgov.com article(02/2012)
- US Builds Cyberwar Virtual Firing Range by Ed Oswald via www.pcworld.com article(02/2012)
- Cyberwar: Mit Fliegerkanonen auf Spatzen by Beat Balzli via www.handelszeitung.ch article(02/2012)
- Iran develops new cyber-army via http://www.infosecurity-magazine.com article(02/2012)
- Internet opens cyber war floodgates by Alex Kayle via www.itweb.co.za article(02/2012)
- Schweiz probt den Cyber-Ernstfall via www.heise.de article(02/2012)
- Inside the Ring by Bill Gertz via www. washingtontimes.com article(02/2012)
- Cyber Command combines offense, defense in planning by Shaun Waterman via www.washingtontimes.com article(02/2012)
- Exclusive Infographic: all Cyber Attacks on Military Aviation and Aerospace Industry by via article(02/2012)
- Fighting in the Fifth Dimension via www.aljazeera.com article(02/2012)
- The Need for a Special Forces Offensive Cyber Group by Dan Dieterle via www.infosecisland.com article(02/2012)
- Die Diplomaten und der Cyberwar by Franz Zauner via www.wienerzeitung.at article(02/2012)
- Book review: Cyber Warfare via www.zdnet.co.uk article(02/2012)
- Iran Remains Defiant in Confronting Cyber Attacks via www.infosecisland.com article(02/2012)
- Wired Opinion: Cyberwar Is the New Yellowcake by Jerry Brito and Tate Watkins via www.wired.com article(02/2012)
- Bloody Valentine For Critical Infrastructure: EtherNet Exploit Could Crash Devices by Paul Roberts via http://threatpost.com article(02/2012)
- Is China a Paper Tiger in Cyberspace? by Adam Segal via http://blogs.cfr.org article(02/2012)
- Mit Cyber-Kriegen lassen sich geostrategische Ziele realisieren by Ramon Schack via www.zeit.de article(02/2012)
- U.S. developing plan to regulate critical infrastructure company cyber defense by Ross Brewer via www.net-security.org article(02/2012)
- Cyber Security Specialist: Disagreements Over Hacking Risk Could Mean Digital 'Cold War' by Peter Apps via www.huffingtonpost.com article(02/2012)
- The state of Cyberwar in the U.S. by Shawnna Robert via www.diplonews.com article(02/2012)
- Big Mac: Security firm McAfee reveals a whopper about China's cyber capabilities by via www.defenceiq.com article(02/2012)
- Droht der Kalte Cyber-Krieg? by ANNIKA KREMER via www.gulli.com article(02/2012)
- Disagreements on cyber risk East-West "Cold War" by Peter Apps via www.reuters.com article(02/2012)
January/12
- U.S. Military Plans Army Of "Cyber Warriors" by via www.prophecydude.org article(01/2012)
- Computerviren sind die Kriegswaffen der Zukunft by Jens Koenen, Sandra Louven, Susanne Metzger und Wolfgang Reuter via www.handelsblatt.com article(01/2012)
- PENTAGON ADMITS: UNPREPARED FOR CYBER WAR via www.wnd.com article(01/2012)
- NATO Doesn't Yet Know How To Protect Its Networks by Spencer Ackerman via www.wired.com article(01/2012)
- A Conversation with Richard Clarke - Part I by Fergal Glynn via www.infosecisland.com article(01/2012)
- Cyberwar report: Israel, Finland best prepared for conflict by John Leyden via www.theregister.co.uk article(01/2012)
- Cyber Shafarat 2012: Cyber Warfare, OpSec and Intelligence by Jeff Bardin via www.infosecisland.com article(01/2012)
- The Nature of Cyberwar by Bruce Schneier via www.schneier.com article(01/2012)
- Cyber Chatter--Newspage of the the US Army Cyber Command article(01/2012)
- Is cyber warfare leading to a new type of arms race? by Justin Stares via www.publicserviceeurope.com article(01/2012)
- Amid Defense Cuts, Cyber Grows at Fort Meade by Tim Lemke via http://odenton.patch.com article(01/2012)
- Russia Must Be Ready for Space, Cyber Wars via http://en.ria.ru article(01/2012)
- Stuxnet and Duqu part of assembly line: researchers via www.homelandsecuritynewswire.com article(01/2012)
- Cyberwar/Cyberkrieg [Kandidaten für den Anglizismus des Jahres] by Anatol Stefanowitsch via www.scilogs.de article(01/2012)
- Cyberspace War: Is Your Business Protected? by via article(01/2012)
- Real Cyberwar: A Taxonomy by Scot Terban via www.infosecisland.com article(01/2012)
- Gruseliger Plan der Bundesakademie für Sicherheitspolitik mit Telekom-Tochter Cyberwar by Hans Georg via article(01/2012)
- Cyber war: hype or reality? by Conn Hallinan via http://peoplesworld.org article(01/2012)
- The Art of Cyberwar by Kenneth Geers via www.internetevolution.com article(01/2012)
- Dutch Council on Int'l Affairs' Advise On Digital Warfare by mrkoot via http://blog.cyberwar.nl article(01/2012)
- Maritime Cybersecurity Low to Non-Existent by Joel Harding via www.infosecisland.com article(01/2012)
- Cyber Threats: From Military to Economic by Pierluigi Paganini via article(01/2012)
- Cyber War: Reality Or Hype? - OpEd by Conn Hallinan via www.eurasiareview.com article(01/2012)
- The Sea Shepherd's cyberwar by Darren Pauli via www.scmagazine.com.au article(01/2012)
- Cyberwar - Obama rüstet für die Kriege der Zukunft by Ansgar Graw via www.welt.de article(01/2012)
- Cyber, Budgets Challenge Transatlantic Planners by SIGNAL Magazine via www.afcea.org article(01/2012)
- US expels Venezuelan diplomat who 'discussed cyber war on America' by via article(01/2012)
- Same Toolkit Spawned Stuxnet, Duqu, And Other Campaigns by Kelly Jackson Higgins via article(01/2012)
- Government engineers actively plan for cyberwar by George V. Hulme via www.csoonline.com article(01/2012)
- New Cyberstrategy Highlights UK Weaknesses by George Taylor via www.internetevolution.com article(01/2012)
December/11
- Cyber Cold War rhetoric haunts the US and China by Graham Webster via www.aljazeera.com article(12/2011)
- Stuxnet weapon has at least 4 cousins: researchers by Jim Finkle via article(12/2011)
- Congress Authorizes Pentagon to Wage Internet War by Ryan Singel via www.wired.com article(12/2011)
- China-Based Hacking of 760 Companies Shows Cyber Cold War by Michael Riley and John Walcott via www.businessweek.com article(12/2011)
- Cyber war accelerates between Iran and US by via http://rt.com article(12/2011)
- Cyber war on US drones? Another spy craft crash, now in Seychelles via http://rt.com article(12/2011)
- Exercise Tested NATO Procedures for Cyber Defense by via www.infosecisland.com article(12/2011)
- China's cyberwar by Editorial Board via www.washingtonpost.com article(12/2011)
- Cyber Soldiers: Hackers in Fatigues by LORI SOLBERG via http://defense-update.com article(12/2011)
- France fingered as worse than China for cyber espionage via www.v3.co.ukarticle(12/2011)
- Approval of covert offensive cyberwar sneakily inserted into NDAA by Madison Ruppert via http://endthelie.com article(12/2011)
- MP: US Forced Back by Iran's Cyber Power via http://english.farsnews.com article(12/2011)
- U.S. power grid is a big, soft target for cyberattack, MIT study shows by Kevin Fogarty via www.itworld.com article(12/2011)
- ENISA Releases DigiNotar Report: Operation Black Tulip via www.infosecisland.com article(12/2011)
- War auch Conficker eine Waffe gegen das iranische Atomprogramm? by Tim Kaufmann via www.gizmodo.de article(12/2011)
- Beware Of The Red Dragon by Paolo Passeri via http://paulsparrows.wordpress.com article(12/2011)
- Conficker, Duqu, Stuxnet, Aliens, Confuxnet! by Rik Ferguson via http://countermeasures.trendmicro.eu article(12/2011)
- India: an army of ethical hackers by Jason Overdorf via www.globalpost.com article(12/2011)
- US power grid needs cybersecurity shield - report by Deborah Zabarenko via www.reuters.com article(12/2011)
- LÜKEX 2011: Deutschland wehrt sich gegen Cyber-Angriffe via www.heise.dearticle(12/2011)
- How Would We Know if a Cyber War Started? by Constantine von Hoffman via http://blogs.cio.com article(12/2011)
November/11
- First Steps in U.S.-China Cyber Cooperation? by Adam Segal via http://blogs.cfr.org article(11/2011)
- Debating Cyber Warfare - More Questions from .GOV by Don Eijndhoven via www.infosecisland.com article(11/2011)
- Minister pleit voor meer Europese Defensiesamenwerking via www.defensie.nl article(11/2011)
- Schneier: Teens and treaties - our cyber-war saviors by Gavin Clarke via www.theregister.co.uk article(11/2011)
- Spooks take the wheel in UK's £650m cyber-war operations by John Leyden via www.theregister.co.uk article(11/2011)
- Obama Invokes Cold-War Security Powers to Unmask Chinese Telecom Spyware by Michael Riley via www.bloomberg.com article(11/2011)
- Cyberwar storm clouds are gathering by Jeff Hecht via www.newscientist.com article(11/2011)
- Can NATO Adapt to Cyber Warfare? by OBIN TIM WEIS via www.frumforum.com article(11/2011)
- Pentagon schließt Cyber-Angriffe durch die USA nicht aus by Stefan Krempl via www.heise.de article(11/2011)
- "Cyberwar": USA drohen Offensive an by Erich Moechel via http://fm4.orf.at article(11/2011)
- NATO Drafting Cyber Warfare International Law Manual by Anthony M. Freed via www.infosecisland.com article(11/2011)
- Cyber-warfare is coming by Jorge Benitez via www.acus.org article(11/2011)
- Cyber Command Presses For More Cyberwar Authority by Colin Clark via http://defense.aol.com article(11/2011)
- U.S. reserves right to meet cyber attack with force by David Alexander via www.reuters.com article(11/2011)
- Why the U.S. is losing the cyberwar against China by Joseph Steinberg via http://venturebeat.com article(11/2011)
- New Naval War College Blue Book on the Changing Nature of War by Kevin Jon Heller via http://opiniojuris.org article(11/2011)
- Debating Cyber Warfare - Questions from .GOV by Don Eijndhoven via www.infosecisland.com article(11/2011)
- US weapons 'full of fake Chinese parts' by Malcolm Moore via www.telegraph.co.uk article(11/2011)
- Pentagon admits to building cyber arms by Reuters via www.smh.com.au article(11/2011)
- DARPA Boosts Cybersecurity Research Spending 50% by J. Nicholas Hoover via www.informationweek.com article(11/2011)
- Darpa Begs Hackers: Secure Our Networks, End 'Season of Darkness' by Spencer Ackerman via article(11/2011)
- Darpa Looks to Protect Drones From Hack Attacks by Spencer Ackerman via www.wired.com article(11/2011)
- OPINION: Welcome To Cyber War by Ellen Ratner via www.talkradionews.com article(11/2011)
- 8. Handelsblattkonferenz Sicherheitspolitik und Verteidigungsindustrie by via www.entity38.de article(11/2011)
- Cyberspace conference: All talk and no action by Brid-Aine Parnell via www.theregister.co.uk article(11/2011)
- "Wir bestrafen Hackerangriffe auf die USA" by Achim Sawall via www.golem.de article(11/2011)
- Cyberwar - ganz offiziell by via http://bazonline.ch article(11/2011)
- Security Expert Warns of Cyber World War via www.foxnews.com article(11/2011)
- IT-Experte Sandro Gaycken hält Hacker-Gruppe "Anonymous" für mäßig gefährlich Sandro Gaycken im Gespräch by Katrin Heise via www.dradio.de article(11/2011)
- Cyber-Sicherheit: NATO sondiert mit Österreich by Patrick Dax via http://futurezone.at
- Chinese cyberwar fear is just "yellow peril" rubbish by Nick Farrell via http://news.techeye.net article(11/2011)
- Stuxnet Raises 'Blowback' Risk In Cyberwar by Tom Gjelten via www.vpr.net article(11/2011)
- US, Europe throw their very first joint cyber-war party by Dan Goodin via article(11/2011)
- Iran's nuclear programme: so much for the new era of cyber war by Will Heaven via http://blogs.telegraph.co.uk article(11/2011)
- Son of Stuxnet could usher in a new chapter in cyber warfare by William Jackson via http://gcn.com article(11/2011)
October/11
- Fighting in the Fifth Dimension by Al Jazeera World via http://english.aljazeera.net article(10/2011)
- Ex-U.S. general urges frank talk on cyber weapons by Andrea Shalal-Esa via www.reuters.com article(10/2011)
- The Non-Existent 'Cyber War' Is Nothing More Than A Push For More Government Control by Tim Cushing via www.techdirt.com article(10/2011)
- Cyberwar begins to gain ground by Marshall Watkins via http://www.stanforddaily.com article(10/2011)
- Large Scale Hacks: U.S. satellites infiltrated for 12 minutes by Mike Wehner via www.tecca.com article(10/2011)
- Digital Diplomacy against hostile regimes by via http://english.ruvr.ru article(10/2011)
- Hacker Halted: Jeff Bardin on the Cyber Intelligence Cycle by via www.infosecisland.com article(10/2011)
- GCHQ chief reports 'disturbing' cyber-attacks on UK by Gordon Corera via www.bbc.co.uk article(10/2011)
- Building a Backdoor by Joel Harding via www.infosecisland.com article(10/2011)
- New cyber attack targets chemical firms: Symantec by Jim Finkle via www.reuters.com article(10/2011)
- Cyber War and the Expanding Definition of War by Sean Lawson via www.forbes.com article(10/2011)
- Cyberweapons Treaties Might Help Prevent Cyberwar, Security Expert Says by Paul Wagenseil via www.securitynewsdaily.com article(10/2011)
- Defense cyber chief: The cloud is the military's next Internet by ALIYA STERNSTEIN via www.nextgov.com article(10/2011)
- NSA to Protect Banks from Foreign Hacks by KENDRA SRIVASTAVA via www.mobiledia.com article(10/2011)
- Why a Cybersecurity Treaty Is a Pipe Dream by Matthew C. Waxman and Adam Segal via www.cfr.org article(10/2011)
- Commentary: The Patriot Act, cyber-edition by Zachary Katznelson via www.mcclatchydc.com article(10/2011)
- Cyber attack, the new battle line by MOUMITA BAKSHI CHATTERJEE via www.thehindubusinessline.com article(10/2011)
- Cybersecurity drills useful but risky by Ellyne Phneah via www.zdnetasia.com article(10/2011)
- Clausewitz and Cyber War by Jeffrey Carr via http://jeffreycarr.blogspot.com article(10/2011)
- The global cybergame has begun by Misha Glenny via www.cbsnews.com article(10/2011)
- 'Duqu' Virus Likely Handiwork Of Sophisticated Government, Kaspersky Lab Says by Kenneth Rapoza via www.forbes.com article(10/2011)
- US-Chinese cyber war dismissed by State Department by Jim Kouri via www.examiner.com article(10/2011)
- Cyber war issue is a great opportunity for UK tech industry by via www.bapcojournal.com article(10/2011)
- Laws for 21st century: A guide to Canada's proposed cyber investigation bills by Kathryn Blaze Carlson via http://news.nationalpost.com article(10/2011)
- Why the US Explored "Cyber War" Against Libya, And Why It Backed Down by Jason Healey via www.acus.org article(10/2011)
- Digital deterrents: Preventing a Pearl Harbor of cyberspace by Dominic Basulto via article(10/2011)
- We'll strike first in cyber warfare by TOM NEWTON DUNN via www.thesun.co.uk article(10/2011)
- Naval Academy preparing officers for cyberwarfare by Matthew Hay Brown via www.baltimoresun.com article(10/2011)
- Cyber War: Still Not a Thing by Tate Watkins via http://reason.com/ article(10/2011)
- Reducing America's Cyberwar Capabilities to a Maginot Line by Dan Dieterle via https://infosecisland.com article(10/2011)
- New Malware Brings Cyberwar One Step Closer by David Talbot via www.technologyreview.com article(10/2011)
- Cyberwar: a Whole New Quagmire. Part 6: Attribution (identifying your attacker) by Marcus J. Ranum via http://fabiusmaximus.wordpress.com article(10/2011)
- The Case for Cyberwarfare by TIM MAURER via www.foreignpolicy.com article(10/2011)
- Duqu, Stuxnet and the World of Cyber Espionage by Sean Michael Kerner via www.esecurityplanet.com article(10/2011)
- The art - and science - of 'active defense' security by via article(10/2011)
- Government and Botnets by Laura Atkins via www.circleid.com article(10/2011)
- The Lexicon Wars and Impediments to Cybersecurity via www.infosecisland.com article(10/2011)
- A virtual secret state: the military-industrial complex 2.0 via www.guardian.co.uk article(10/2011)
- The Once and Future War - A conversation with Major General Jonathan Shaw, CBE by via article(10/2011)
- Freedom and security in cyberspace by The Economist via article(10/2011)
- Cold war - code war… by Andrei Kislyakov via http://english.ruvr.ru article(10/2011)
- U.S. government simulates cyber attack for training by Tabassum Zakaria via http://in.reuters.com article(10/2011)
- Congressman lambastes Chinese cyber-espionage by Ellen Nakashima and Jason Ukman via www.washingtonpost.com article(10/2011)
- Siege Warfare in the Cyber Age byeSecurityPlanet Contributor via www.esecurityplanet.com article(10/2011)
- Pentagon Cuts Could Spare CyberWar Efforts, Lynn Says by Tim Watson via www.executivegov.com article(10/2011)
September/11
- Israel and Cyber Warfare by Stefano Mele via www.infosecisland.com article(09/2011)
- Stuxnet and its Motivations by Kassem Bagher via http://kbagher.tumblr.com article(09/2011)
- The Pentagons Cyberstrategy, One Year Later by William J. Lynn III via www.foreignaffairs.com article(09/2011)
- Cybersecurity needs maritime diplomacy via www.federalnewsradio.com article(09/2011)
- Iran warns US and UK cyber attacks will result in retaliation via http://packetstormsecurity.org article(09/2011)
- Japan defence firm Mitsubishi Heavy in cyber attack via www.bbc.co.uk article(09/2011)
- China denies hacking high-tech weapon maker by Graham Cluley via http://nakedsecurity.sophos.com article(09/2011)
- Cyber Security Konferenz: Mikl-Leitner fordert Schulterschluss zwischen Wirtschaft und Politik by via www.live-pr.com article(09/2011)
- Virtual Wars -- China must join hands with other countries to fight cyberattacks by YIN PUMIN via www.bjreview.com.cn article(09/2011)
- U.S. - Australia announce cyber defense treaty via www.homelandsecuritynewswire.com article(09/2011)
- After Stuxnet, waiting on Pandora's box by Jason Ukman via www.washingtonpost.com article(09/2011)
- Italian researcher finds more SCADA holes by Elinor Mills via http://news.cnet.com article(09/2011)
- Information Warfare Directory by Joel Harding via www.infosecisland.com article(09/2011)
- US Matrix-style Cyberwar firing range moves forward by Lewis Page via www.theregister.co.uk article(09/2011)
- How to Wage War in Cyberspace with Iran by Joel Harding via http://toinformistoinfluence.com article(09/2011)
- Cyberwar bad for business by Darren Pauli via www.scmagazine.com.au article(09/2011)
- Cyber War Added to Threats Under U.S., Australia Defense Treaty by Jim Rubin and Terry Atlas via www.sfgate.com article(09/2011)
- IBM pleit voor cyber-NAVO via www.nu.nl article(09/2011)
- US needs to kick network security intelligence up a notch by Michael Cooney via www.networkworld.com article(09/2011)
- Arming the country for cyber attack by Hugh White via www.theage.com.au article(09/2011)
- DDoS Defense: Preventing business disruption by Richard Clarke via www.forbes.com article(09/2011)
- A Stuxnet Apocalypse? by Scot Terban via www.infosecisland.com
- Cyberwar: Iran Counterattacks? by Stewart Baker via http://volokh.com article(09/2011)
- Study warns US must develop cyber intelligence via www.canadianbusiness.com article(09/2011)
- Sourcefire to Present at the ThinkEquity 8th Annual Growth Conference by via www.bradenton.com article(09/2011)
- The Calm Before the Storm by JOEL BRENNER via www.foreignpolicy.com article(09/2011)
- Exploring the technology behind cyberterrorism by Nigel Stanley via www.businesscomputingworld.co.uk article(09/2011)
- A decade after 9/11, cyberattack is biggest worry, says Janet Napolitano by Dave Cook via www.csmonitor.com article(09/2011)
- Guerilla Cyber Warfare: Are We Thinking Defensively? By Robert Vamosi via www.securityweek.com article(09/2011)
- Cyberwar: a Whole New Quagmire. Part 1: The Pentagon Cyberstrategy by Fabius Maximus via http://fabiusmaximus.wordpress.com article(09/2011)
- Cyberwar; Certified Lies: 531 Spy Certs target CIA, Google, Microsoft, Mozilla by Ms. Smith via www.networkworld.com article(09/2011)
- Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses by Stephen Herzog via http://scholarcommons.usf.edu
- Opinion: There is no Geneva Convention online by John Mitchell via article(09/2011)
- DigiNotar SSL certificate hack amounts to cyberwar, says expert by Charles Arthur via www.guardian.co.uk article(09/2011)
- Expert says UK government is too preoccupied with launching cyber attacks by Stuart Sumner via www.computing.co.uk article(09/2011)
- The Laws Of War And Cyber Warriors via www.strategypage.com article(09/2011)
August/11
- Cyberspace and 4th Generation Warfare - A Marriage of Convenience by Don Eijndhoven via www.infosecisland.com article(08/2011)
- Betting on the next wave of cyber-security by Philip Ewing via www.dodbuzz.com article(08/2011)
- Geeks are the future of warfare by Terry Costlow via http://defensesystems.com article(08/2011)
- Review: 'Counterstrike' details U.S. intelligence agencies' cyberwar efforts in Iraq via www.mercurynews.com article(08/2011)
- NSA hiring recruits for cyber Cold War by David Gomez via www.tgdaily.com article(08/2011)
- Internet Security Alliance chief attacks Obama cybersecurity plan by article(08/2011)
- U.S. Military Disables Iraqi Insurgent Websites, Book 'Counterstrike' Says by Tony Capaccio and Brendan McGarry via www.bloomberg.com article(08/2011)
- What next for cybersecurity? by The Secure View via http://situationalroom.wordpress.com article(08/2011)
- Why US Will Lose a Cyber War by Jeffrey Carr via http://the-diplomat.com article(08/2011)
- Code blue for China's red army by Stephen Chen via http://topics.scmp.com article(08/2011)
- INSA Report: Cyber Intelligence… Setting the landscape for an emerging disciple by Bob Gourley via www.sys-con.com article(08/2011)
- Navy conducts first shipboard cyber inspection by Jared Serbu via www.federalnewsradio.com article(08/2011)
- Smart grid data analytics via www.net-security.org article(08/2011)
- Cyber recruits key part of NSA hiring blitz via www.federalnewsradio.com article(08/2011)
- Is It Cyberwar? -- Vote on which scenarios you think qualify as acts of war. via http://labs.slate.com article(08/2011)
- Russia and China accused of cyber-spying campaign to steal U.S. secrets by Ken Dilanian via www.latimes.com article(08/2011)
- CSTO to strengthen cyber defense after Arab unrests - Russian newspaper via http://news.am article(08/2011)
- Pentagon wastes time defining cyberwar rather than trying to fight the one it's already in by Kevin Fogarty via www.itworld.com article(08/2011)
- Czech Cyber Security Strategies By Kevin Coleman via http://defensetech.org article(08/2011)
- Mediocre hackers can cause major damage -- Researchers find vital infrastructure, factories at risk via www.washingtontimes.com article(08/2011)
- NIST proposes national cybersecurity education and training plan via www.infosecurity-us.com article(08/2011)
- Cyberwar: When We Do It, It's OK; If They Do It, It's War by Robert Dreyfuss via www.thenation.com article(08/2011)
- Ex-CIA official sounds alarm about hackers' next targets by John D. Sutter via www.cnn.com article(08/2011)
- Why is the West silent on 5-year cyberwar launched by China? by Kevin Fogarty via www.itworld.com article(08/2011)
- DOD Cyber Strategy Remains Ambiguous on Threats and Responses by Sean Lawson article(08/2011)
- China is the Voldemort of hacking: it that must not be named! by Venky Vembu via www.firstpost.com article(08/2011)
- US gov't building hacker army for cyber war by Andrew Couts via www.digitaltrends.com article(08/2011)
- Countries brace for The Code War By David Goldman via http://money.cnn.com article(08/2011)
- 'State actor' behind global cyber attacks by TERESA SMITH via www.montrealgazette.com article(08/2011)
- Former CIA official sees terrorism-cyber parallels By Tabassum Zakaria via www.reuters.com article(08/2011)
- Enter the Cyber-dragon By Michael Joseph Gross via www.vanityfair.com article(08/2011)
- Has the United States already suffered its cyberwar Pearl Harbor? By Steven J. Vaughan-Nichols via www.zdnet.com article(08/2011)
- A Domain Like Cyberspace By SEAN LAWSON via http://blogs.forbes.com article(08/2011)
- McAfee deckt Cyber-Attacke auf -- Größter Hacker-Angriff der Geschichte via article(08/2011)
- New federal CIO named; no major strategy changes anticipated By Joseph Marks via www.nextgov.com article(08/2011)
- U.S. government hankers for hackers by Warren Strobel and Christopher Wilson via www.reuters.com article(08/2011)
July/11
- Glass Dragon: China's Cyber Offense Obscures Woeful Defense article(07/2011)
- article(07/2011)
- The U.S. and China are Engaged in a Cyber Cold War article(07/2011)
- Stuxnet clones may target critical US systems, DHS warns by Dan Goodin via www.theregister.co.uk article(07/2011)
- A Brief History of the Stuxnet Worm Including Its Targets, the Initial Findings, Possible Creators of the Worm and Its Effects by Robert M. Lee via www.controlglobal.com article(07/2011)
- Report: DOD in the Midst of a Global Cyberspace Crisis via www.infosecisland.com article(07/2011)
- DHS officials: Government networks no more vulnerable to cyberattacks by JOSH SMITHarticle(07/2011)
- Australian report identifies cybersecurity gaps during Cyber Storm III exercise via www.infosecurity-us.com article(07/2011)
- Army chief sees cybersecurity as "defining issue" by ROBERT BURNS via www.sfgate.com article(07/2011)
- London Cyber-Rules Conference Set For November July 26, 2011 by Matthew Broersma via www.eweekeurope.co.uk article(07/2011)
- Head of U.S. cyber agency resigns suddenly by Tabassum Zakaria via www.reuters.com article(07/2011)
- Schutz vor dem Cyberwar by CONRAD SEIDL via https://derstandard.at article(07/2011)
- CLINTONS INTERNETBERATER SCOTT ZU CYBERWAR von JULIA SEELIGER via www.taz.de article(07/2011)
- The Cybersecurity-Industrial Complex by Jerry Brito & Tate Watkins via http://reason.com article(07/2011)
- Cyber Storm III: the results are in by Suzanne Tindal via article(07/2011)
- Cybersecurity: The New Frontier - Dickie George of the NSA on the State of Information Security Educationarticle(07/2011)
- Draft Example: Cyber warfare researcher matrix by Professors Sam and Sydney Liles article(07/2011)
- Here, There Be Dragons - The cyberwar threat is being hyped because of a fear of unknown dangers. The biggest threat of all may come from our own overreaction. by Michael Hirsh via www.nationaljournal.com article(07/2011)
- A crime wave in cyberspace by Noah Shachtman via www.washingtonpost.com article(07/2011)
- Action on electrical grid cybersecurity is needed by Sen. Jeff Bingaman via http://thehill.com article(07/2011)
- Charlie Rose Talks to General Keith Alexander by Charlie Rose via www.businessweek.com article(07/2011)
- Economic and Policy Frameworks for Cybersecurity Risks by Allan A. Friedman via www.brookings.edu article(07/2011)
- Learning to defend against cyber warfare by Rick Rojas via www.latimes.com article(07/2011)
- Seoul to build traffic control tower resistant to cyber attacks by ejkim via article(07/2011)
- Cyber Security: the U.S. military are based on the experience of private by Jean Elyan via www.lemondeinformatique.fr article(07/2011)
- World is at war - with data -- A different kind of cold war by Andrea Petrou via www.techeye.net article(07/2011)
- Stuxnet returns to bedevil Iran's nuclear systems via www.debka.com article(07/2011)
- Russia, US in cyber peace pact via http://english.ruvr.ru article(07/2011)
- US DoD Announces First Strategy for Operating in Cyberspace by Staff Writers via www.spacewar.com article(07/2011)
- Cyber threat grows more destructive, Lynn says by Karen Parrish via article(07/2011)
- America Has A War Plan via www.strategypage.com article(07/2011)
- On cybersecurity, Congress can't agree on turf by Ben Pershing via www.washingtonpost.com article(07/2011)
- Cyberwar: Pentagon Takes On Cyber Enemies, Other Agencies via www.defenseindustrydaily.com article(07/2011)
- Senators: US needs to define acts of cyberwar by John T. Bennett via http://thehill.com article(07/2011)
- DARPA Seeks To Learn From Social For Warfare by Elizabeth Montalbano via http://informationweek.com article(07/2011)
- U.S. signs cybersecurity pact with India by Josh Smith via www.nextgov.com article(07/2011)
- One if by Land, Two if by Sea and Three if by Cyberspace- by Noel Brinkerhoff and Ken Broder via article(07/2011)
- Cyberwar: It's Not Just Fiction Anymore by Arik Hesseldahl via http://allthingsd.com article(07/2011)
- Marine General Calls for Stronger Offense in U.S. Cyber-Security Strategy by Fahmida Y. Rashid via www.eweek.com article(07/2011)
- DOD should take lead on cyber info sharing: panel -- Department uniquely qualified to lead cross-agency efforts by Amber Corrin via http://defensesystems.com article(07/2011)
- Shoring Up National Cyber Security Infrastructure by Robert Siciliano via www.50statesonline.org article(07/2011)
- U.S. military wants to 'protect' key civilian networks by Declan McCullagh via http://news.cnet.com article(07/2011)
- DOD could use force in cyber war by Jennifer Martinez via http://dyn.politico.com article(07/2011)
- First look inside the military's cyber war room by David Martin via www.cbsnews.com article(07/2011)
- US and China face vast divide on cyber issues by Reuters via article(07/2011)
- U.S. cyber defenses 'way too predictable' says Cartwright by Kevin Baron via www.stripes.com article(07/2011)
- Cyberwar Plan Has New Focus on Deterrence by JULIAN E. BARNES and SIOBHAN GORMAN via http://online.wsj.com article(07/2011)
- Pentagon Makes Love, Not Cyber War, in New Strategy by Noah Shachtman via www.wired.com article(07/2011)
- Pentagon discloses largest-ever cyber theft by Robert Burns via www.foxnews.com article(07/2011)
- Cyber security and control systems -- Are these systems the real Achilles heel? by Phil Carson via www.intelligentutility.com article(07/2011)
- Pentagon declares the Internet a war domain by John T. Bennett via http://thehill.com article(07/2011)
- U.S. Cyberwar Plans Fail to Deter Attacks, Says VCJCS Gen. Cartwright by Sandra Erwin via www.nationaldefensemagazine.org article(07/2011)
- Are Industrial Control Systems Secure? by Dr. Alastair MacWillson www.securityweek.com article(07/2011)
- (Cyber)War… What Is It Good For? by John Linkous via http://situationalroom.wordpress.com article(07/2011)
- DOD to Announce First Cyberspace Strategy by cryptome via http://cryptome.org article(07/2011)
- Definition of Cyberwar: No Results Found by Dan Blum via http://blogs.gartner.com article(07/2011)
- OVERNIGHT TECH: Pentagon drops cyberspace strategy Thursday by Gautham Nagesh via http://thehill.com article(07/2011)
- Pentagon's cyber strategy aims to quell fears of militarizing cyberspace by Aliya Sternstein via www.nextgov.com article(07/2011)
- Exploiting the Term Cyberattack by Eric Chabrow via http://blogs.govinfosecurity.com article(07/2011)
- Winning the Critical Infrastructure War by Chris Blask via www.infosecisland.com article(07/2011)
- Lessons from Estonia: Preparing for a major cyberattack by Erin Dian Dumbacher via www.nextgov.com article(07/2011)
- How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History by Kim Zetter via www.wired.com article(07/2011)
- March DDoS attack was N.Korean cyber war drill: US expert by Dong-A and Alperovitch via http://english.donga.com article(07/2011)
- The shape of cyberwar to come by Paul Mah via www.fiercecio.com article(07/2011)
- DoD cancels plans to move DISA to U.S. Cyber Command by Nicole Johnson via http://blogs.federaltimes.com article(07/2011)
- Pentagon's cyber strategy aims to quell fears of militarizing cyberspace by Aliya Sternstein via /www.nextgov.com article(07/2011)
- DoD to Release Public Version of Cyber Strategy by Marcus Weisgerber via www.defensenews.com article(07/2011)
- The plutocrats worry about the cyber-paupers coming for their stuff by George Smith via www.sitrep.globalsecurity.org article(07/2011)
- The Online Blue Army Threatens China via www.strategypage.com article(07/2011)
- Military Camp 144 by via www.strategypage.com article(07/2011)
- South Korean Web attacks might have been war drill by Jim Finkle via www.reuters.com article(07/2011)
- McAfee: Attacks on South Korea Likely Cyberwar Exercise via www.infosecisland.com article(07/2011)
- North Korea steps forward as new cyberwar villian by Kevin Fogarty via www.itworld.com article(07/2011)
- Successful Cyber Attacks Reveal Chinks in US and UK Security Reviews by Chris McIntosh via www.defenceiq.com article(07/2011)
- Why Cyberwar Is Unlikely by Stuart Fox via www.securitynewsdaily.com article(07/2011)
- CyberWar is Hell by David Harley via www.scmagazineus.com article(07/2011)
- Cyberattacks on South Korea-US a test run: McAfee by Glenn Chapman via www.google.com article(07/2011)
- Red herrings and the threat of cyber war via www.publicservice.co.uk/ article(07/2011)
- Gates' Final Word Is That Defense CIO Duties Do Not Go to CYBERCOM by Max Cacas via www.afcea.org article(07/2011)
- US Cyber Command Adds New Appointees by Aquala Bogan via www.executivegov.com article(07/2011)
- Obama's cyberattack stance will bounce by Thomas Wright via http://technologyspectator.com.au/ article(07/2011)
- Government claims threat from cyber attacks 'equal' to that of nuclear bombs by Andrew Wooden via www.pcr-online.biz article(07/2011) related: interview with the UK cabinet
minister Francis Maude
- Dutch Cyber Security Council Now Operational by Don Eijndhoven via infosecisland.comarticle(07/2011)
- Nigeria: Hacking - 'Country Has Cyber-Soldiers to Protect Its Cyberspace' by Nahimah Ajikanle Nurudeen via http://allafrica.com/ article(07/2011)
- Regulating the World Wide Web by Jonas Rey via www.isn.ethz.ch article(07/2011)
- SCADA communication vulnerabilities by Edvard via http://electrical-engineering-portal.com article(07/2011)
- UN Regional Organization to Vote on Cybersecurity Decree by ALIYA STERNSTEIN article(07/2011)
- Perspectives coming out of the East/West Institute's global cyber security summit in London by Mr. Robert N. Campbell III via www.civsourceonline.com article(07/2011)
- Cybersecurity battles complicated by laws, ethics by Deborah M. Todd via www.therepublic.com article(07/2011)
- South Korea to expand military cyber unit by via http://timesofindia.indiatimes.com article(07/2011)
- Framing Cyber Warfare: Between Offence And Defence - Analysis by RSIS via www.eurasiareview.com article(07/2011)
June/11
- U.S. China Cyber Détente By Kevin Coleman article(06/2011)
- NATO-Russia experts discuss protection of critical infrastructure via www.nato.int article(06/2011)
- Why China established 'Online Blue Army' By Guo Lei, Gu Caiyu and Wu Lan via article(06/2011)
- Common cyberspace via www.chinadaily.com article(06/2011)
- MoD cyber-command will combine with intelligence by Tom Espiner via www.zdnet.co.uk/
- Lack of Attribution Undermines Clarke's China Warning by J. Oquendo via www.infosecisland.com article(06/2011)
- InfraGard: Cyberwar Declaration on the Horizon article(06/2011)
- Cyber-war has come to remain by Joseph Poliszuk via http://english.eluniversal.com article(06/2011)
- Effective cyber defense requires new processes by Amber Corrin via http://defensesystems.com article(06/2011)
- Cyber attacks outpace global response, U.S. warns by Mark Heinrich via www.reuters.com article(06/2011)
- Expert in Cyberwarfare Welcomes Obama's Long-Awaited Executive Orders by Patricia Donovan via www.buffalo.edu/ article(06/2011)
- The best talk ever given on NERC CIPs and grid security ... period by Andy Bochman via www.smartgridnews.com article(06/2011)
- Should the US and China have a cyber pow-wow? via http://defensesystems.com article(06/2011)
- China's Rise from Hacking To Digital Espionage via www.infosecisland.com article(06/2011)
- How Symantec Cracked Stuxnet by David Strom via www.readwriteweb.com article(06/2011)
- South Korea opens cyber-war school via www.timeslive.co.za article(06/2011)
- Chinese cyber attacks target German ministers via www.thelocal.de article(06/2011)
- The Pentagon's New Vision for Cyber Warfare via www.theatlanticwire.com article(06/2011)
- Summit: Stuxnet a Turning Point By Gregory Hale via http://www.isssource.com/ article(06/2011)
- Professor: Respond to cyberattacks with counterattack via http://www.mnn.com/ article(06/2011)
- Active self-defense strategy best deterrent against cyber-attacks via http://scienceblog.com/ article(06/2011)
- Navy takes spiral approach to cyber acquisition via http://defensesystems.com/ article(06/2011)
- Do the U.S. and China need a 'cyber détente'? via www.dodbuzz.com article(06/2011)
- Persistent threats challenge US military cyber ops via http://defensesystems.com article(06/2011)
- Fishy Chips: Spies Want to Hack-Proof Circuits via www.wired.com article(06/2011)article(06/2011)
- EUGENE, Oregon - It's not science fiction, say Cyber War experts who report a recent "string of cyber attacks" that threaten U.S. security, and why a "cyber attack" is now viewed as "an act of war." via www.huliq.com article(06/2011)
- Op-Ed Contributors -- The Net and how the US is caught in it via www.chinadaily.com.cn article(06/2011)
- Connect the Dots On Cyber Attacks via www.theintelligencer.net article(06/2011)
- China and Britain locked in cyber war via www.telegraph.co.uk article(06/2011)
- China: There is No Cyber War With the United States via www.infosecisland.com article(06/2011)
- China denies cyber war with US via http://timesofindia.indiatimes.com/ article(06/2011)
- Defense firms see opportunity in cyber attacks via http://www.reuters.com/ article(06/2011)
- Pentagon gets cyberwar guidelines By LOLITA C. BALDOR, Associated Press article(06/2011)
- Pentagon sharing intelligence on cyberthreats via http://www.washingtontimes.com/ article(06/2011)
- SCADA Systems: Achilles Heel of Critical Infrastructure via http://www.cio.com.au/ article(06/2011)
- Cyber war: How close are we to the real thing? via http://gcn.com article(06/2011)article(06/2011)
- The New Rules: Don't Fear U.S. Cyber Deterrence via www.worldpoliticsreview.com article(06/2011)
- Boeing und EADS rüsten digital auf via sueddeutsche.de article(06/2011)
- Cyber Warfare: Unity in Defense article(06/2011)
- Chinese Weapon Systems Vulnerable To SCADA Hack article(06/2011)
- Warum das neue Cyber-Abwehrzentrum der Bundesregierung so nicht funktioniert von Hadmut Danisch article(06/2011)
- Protecting Humanitarian Interests in Cyber Conflict article(06/2011)
- Cyberwarfare: What it is, what it means to you and why you should be concerned. Richard Clarke speaks out in WSJ article in a call to arms. article(06/2011)
- Iran to launch first cyber command article(06/2011)
- Cyberwar: A More Realistic Threat Assessment article(06/2011)
- Die Welt rüstet zum CyberWar - eine Chronik article(06/2011)
- The Third International Conference on Cyber Conflict brought together 380 experts from across the world article(06/2011)
- Cyberspace should be platform for peace, not battleground article(06/2011)
- Defence minister [of Switzerland] ponders cyber-security article(06/2011)
- N. Korea commands 3,000-strong cyber warfare unit: defector article(06/2011)
- DARPA Builds Cyberwarfare Proving Ground article(06/2011)
- Cyberwarfare unfreezing a new Cold War warns McAfee CSO article(06/2011)
- METAPHORS MATTER IN "CYBER WAR" DEBATE by Emily Badger article(06/2011)
- Germany Arms Itself for Cyber War -- Spiegel article(06/2011)
- USA sehen Abschreckung als beste Verteidigung --tagesschau article(06/2011)
- Der Cyberwar hat längst begonnen --SWR article(06/2011)
- Chinese military warns of U.S. cyberwar threat article(06/2011)
- Brazil raises cyber defense game article(06/2011)
- Sicherheitsexperte zweifelt am neuen Cyber-Abwehrzentrum -- "Am besten das ganze IT-Zeug wegschmeißen" Interview mit Sandro Gaycken article(06/2011)
- China military paper urges steps against U.S. cyber war threat article(06/2011)
- Iran to Boost Soft Power through Establishing New Cyber Command article(06/2011)
- DoD Cybersecurity Spending: Where's the Beef? article(06/2011)
- Feds Press Forward With Online Cybersecurity Plan article(06/2011)
- Cyber Counterintelligence Doctrine - Offensive CI article(06/2011)
- Cybersecurity: A Worldwide Policy article(06/2011)
- China und USA befinden sich im Cyber-Krieg article(06/2011)
- NSA $3.2 Billion "Site M" Expansion Planning Documents Reveal Cyberwar Command Center article(06/2011)
- China's Cyberassault on America by Richard Clarke (WSJ) article(06/2011)
- U.S. and China need to set cyber intelligence limits - Kissinger article(06/2011)
- Big Questions About Cyberwar article(06/2011)
- Cyber security: EU prepares to set up Computer Emergency Response Team for EU Institutions article(06/2011)
- The Fog of Cyberwar: What Are the Rules of Engagement ? article(06/2011)
- Estonia training Nato 'techies' for cyberwar article(06/2011)
- Seoul launches cyber security plan article(06/2011)
- N. Korea's cyber attacks become bolder, smarter: military spy chief article(06/2011)
- CIA Chief Leon Panetta: Cyberattack Could Be 'Next Pearl Harbor' article(06/2011)
- Observations from ICCC by Ralph Langner article(06/2011)
- Experts recommend an international code of conduct for cyberwar article(06/2011)
- The Third International Conference on Cyber Conflict brought together 380 experts from across the world article(06/2011)
- China and the US: Sizing Up for Cyber War? article(06/2011)
- Divisions Seen In Administration Over Cyberthreats article(06/2011)
- EU to study Estonia's world-leading cyber defense mechanisms article(06/2011)
- Das unterscheidet die guten von den bösen Hackern article(06/2011)
- European nations fail to develop anti-cyber attack strategies. article(06/2011)
- Attribution Problems Hinder U.S. Cyberwar Strategy article(06/2011)
- Deterrence won't stop cyber-attacks article(06/2011)
- Cyber espionage a serious threat: AG article(06/2011)
- Estonian Defence Minister: A cyber-attack is no different than an ordinary attack article(06/2011)
- General: NATO Cyber Defense Center Rapidly Developing article(06/2011)
- Hacker to go public with Siemens SCADA control flaws article(06/2011)
- After delay, hacker to show flaws in Siemens industrial gear article(06/2011)
- NATO tackles cyber security at Tallinn meet article(06/2011)
- Cyber counter-intelligence - a new realm article(06/2011)
- Government formed Cyber Defence Unit of the Defence League article(06/2011)
- Vermehrt Hackerangriffe auf Firmen article(06/2011)
- Der Siegeszug der Hacker ARTE -- Themen Abend -- article(06/2011)
- Battleground Cyberspace: Hackers vs. White Hats article(06/2011)
- Ministry of Defence foiled 1,000 cyber attacks says Fox article(06/2011)
- CodeWars - CNBC - article(06/2011)
- British Armed Forces Minister Comments on Response to Cyber War article(06/2011)
- Pentagon's "Big Stick Ideology" Meets its First Test of Willpower article(06/2011)
- China Calls US Culprit in Global 'Internet War' article(06/2011)
- Cyber war sabers rattle across the globe article(06/2011)
- USA und Großbritannien fordern globalen Kampf gegen Cyber-Attacken article(06/2011)
- A military response to cyberattacks is preposterous article(06/2011)
- Nato-Staaten rüsten für das fünfte Schlachtfeld article(06/2011)
- North Korea Training Cyberwarriors at Foreign Colleges article(06/2011)
May/11
- An International Criminal Court or Tribunal for Cyberspace (ICTC)
- Senior Defense Official Caught Hedging on U.S. Involvement in Stuxnet article(06/2011)
- Chinese responses to the International Strategy for Cyberspace article(05/2011)
- NATO: Cyber Defense and the New Strategic Concept article(05/2011)
- Aus govt gets cracking on cyber threats article(05/2011)
- AMERICA'S CYBER FUTURE: SECURITY AND PROSPERITY IN THE INFORMATION AGE article(05/2011)
- Cyberwar: When We Do It, It's OK; If They Do It, It's War article(05/2011)
- NEUE US-STRATEGIE ZUM CYBERWAR -- Wenn aus Spaß Ernst wird article(05/2011)
- Homemade cyberweapon worries federal officials article(05/2011)
- Cyber War Recruiting Comes Up Light article(05/2011)
- Researcher blasts Siemens for downplaying SCADA threat article(05/2011)
- Siemens Accused Of Whitewashing Critical Security Bugs article(05/2011)
- Project CyW-D is dedicated to monitoring and documenting the shifting public policy discourses associated with "cyberwar" in the United Statesarticle(05/2011)
- Reset-Knopf für Sicherheitsfetischisten article(05/2011)
- Cyberattack-alert system could be model for U.S. article(05/2011)
- Chinese responses to the International Strategy for Cyberspace article(05/2011)
- U.S. reserves right to respond militarily to cyber attack, says White House article(05/2011)
- US warns: hack us, and we might bomb you article(05/2011)
- AusCERT 2011: Second Stuxnet worm on the horizon article(05/2011)
- Prime minister announces new cyber defense taskforce article(05/2011)
- North Korea's Cyber Army Gets Increasingly Sophisticated article(05/2011)
- Iran to establish first cyber command article(05/2011)
- Administration unveils cybersecurity foreign policy article(05/2011)
- Stuxnet and the Emerging Cyber Arms Race article(05/2011)
- Kriege oder der Cyberwar der Zukunft - Die Eitelkeit des Menschen article(05/2011)
- US calls on its Nato partners to help resist cyber-attacks article(05/2011)
- Obama outlines global cyberspace plan article(05/2011)
- As cyber attacks rise, India sets up central command to fight back article(05/2011)
- North Korea denies computer attack on South article(05/2011)
- Critical Infrastructure Vulnerable in Cyber-Attacks article(05/2011)
- Secrets Surface About North Korea's Cyberwar College article(05/2011)
- US politicians call for greater cyber-attack disclosure article(05/2011)
- Schmidle: Cyber ops might require new combatant command structure article(05/2011)
- Re-Analyzing Cyberdeterrence and Cyberwarfare article(05/2011)
- There will be more attacks like Stuxnet: ArcSight article(05/2011)
- President Obama has declared that the "cyber threat is ... article(05/2011)
- U.S. Cyber Command: Waging War In The World's Fifth Battlespace article(05/2011)
- Interop: Cyberwar test runs yield information about defenses article(05/2011)
- Under cybersecurity plan, agencies would answer to DHS article(05/2011)
- China Launches Agency to Oversee Internet Control article(05/2011)
- Enter Unit 8200: Israel arms for cyberwar article(05/2011)
- United Kingdom Points Finger at Chinese Army for Increased Cyber-attacks article(05/2011)
- White House to unveil cybersecurity proposal article(05/2011)
- Cyberwarfare May Be A Bust For Many Defense Contractors article(05/2011)
- Shin Bet: Critical infrastructure targeted by cyber-warfare article(05/2011)
- Nine Deadly Cyberwarfare Sins article(05/2011)
- Cyberwar-Artikel: Preprint-Download nun möglich D. Kriesel article(05/2011)
- Österreich baut große Militärtruppe Cyber Defense auf article(05/2011)
- Comment: Cyber war - is it defensible? article(05/2011)
- (News Focus) N. Korea's cyber warfare unit in spotlight after attack on S. Korean bank article(05/2011)
- Protecting your ICS from Zero-Day Attacks (plus Video) article(05/2011)
- Cyberwar Is Harder Than It Looks article(05/2011)
- Innovation and Creativity in Cyber Defense article(05/2011)
- Cyberwar: Bruce Schneier @ Black Hat Europe 2011 article(05/2011)
- Nationales Cyber-Abwehrzentrum und Gemeinsames Internetzentrum article(05/2011)
- China Fights a War Without Firing a Gun article(05/2011)
- China Advances Cyber Warfare as Primary Strategy article(05/2011)
April/11
- Cyberwar: Konzept, Stand und Grenzen article(04/2011)
- The Cyberwar Arms Race article(04/2011)
- Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy article(04/2011)
- Are we talking "cyber war" like the Bush admin talked WMDs? article(04/2011)
- Cyberwarriors on the Eastern Front: In the line of fire packet floods article(04/2011)
- 'Dirty bomb' bigger threat than war: Army article(04/2011)
- Iran targeted in new malware attack article(04/2011)
- Where is the "Public Awareness" in the Cyber Security Public Awareness Act? article(04/2011)
- Iran says it has detected second cyber attack article(04/2011)
- Move to smart grid presents cyber threats article(04/2011)
- FEATURE-Govts struggle to recruit, keep "cyber warriors" article(04/2011)
- Lab halts Web access after cyber attack article(04/2011)
- Cyber Security Lacking for Critical Infrastructure Systems article(04/2011)
- Cyber attacks rise at critical infrastructure firms article(04/2011)
- Studie: Cyber-Angriffe auf kritische Infrastrukturen nehmen zu article(04/2011)
- Cyber Attack Hits Oak Ridge National Laboratory article(04/2011)
- Simulated Cyber Attack Reveals EU Flaws in Coordination article(04/2011)
- The Art of Cyber Warfare: Counterattack Fail article(04/2011)
- DEFENSE DEPARTMENT PREPARES FOR CYBERWAR article(04/2011)
- Dissident warns of 'silent cyber war' -- Activist says Canadians are within China's reach article(04/2011)
- The Mighty 1st Technical Reconnaissance Bureau article(04/2011)
- Iran accuses Siemens of helping launch Stuxnet cyber-attack article(04/2011)
- Iran: Computer worm could have caused huge damage article(04/2011)
- Senators Introduce Cyber Security Public Awareness Act article(04/2011)
- Studie: Stuxnet befällt deutsche Energieversorger article(04/2011)
- ENISA Issues Report on 'Cyber Europe 2010' Cyber Security Exercise article(04/2011)
- Dr. Sandro Gaycken spricht auf der Konferenz Cyber Security article(04/2011)
- Iran May Sue Siemens over Stuxnet Virusarticle(04/2011)
- China Accelerates Cyber Attacks, Espionage article(04/2011)
- China's Silent Cyber Takeover? article(04/2011)
- Defending against cyber attacks article(04/2011)
- Florida Power & Light Company (FPL) Fort Sumner Wind turbine Control SCADA was HACKED article(04/2011)
- Iran: Computer worm could have caused huge damage article(04/2011)
- Report Describes Far-Flung Chinese Cyber Espionage Against U.S. Government article(04/2011)
- Innovation, Espionage, and Chinese Technology Policy article(04/2011)
- Iran says Siemens behind Stuxnet cyber attack article(04/2011)
- U.S. and Russia Differ on a Treaty for Cyberspace article(04/2009)
- Special report: In cyberspy vs. cyberspy, China has the edge article(04/2011)
- US-Sicherheitsexperte Clarke sieht in Cyberwar größere Bedrohung als in internationalem Terrorismus article(04/2011)
- U.S. needs cyber-emergency response, lawmaker says article(04/2011)
- DEFENSE DEPARTMENT PREPARES FOR CYBERWAR article(04/2011)
- U.S. Internet Hypocrisy Creates Global Suspicion article(04/2011)
- Air Force CIO Discusses Future Of Cyberwar Ops article(04/2011)
- Russia's President Medvedev denounces cyber-attack article(04/2011)
- Can Hackers Crash Planes? article(04/2011)
- Defence Ministers approve Cyber Defence Concept and take next step in defence reform article(04/2011)
- Social media: the frontline of cyberdefence? article(04/2011)
- Cyber Security and Freedom: Rules For The Road article(04/2011)
- Strategic Cyber Security and a Commercial Cloud? article(04/2011)
- Symantec Report Details the Evolving Threat Landscape article(04/2011)
- The Art of Cyber Warfare - Educational Fail article(04/2011)
- Cyber wars by Gibran Ashraf article(04/2011)
- Cyber attackers have the edge, experts admit article(04/2011)
- Critical Infrastructure Partnership Advisory Council article(04/2011)
- Cyberattacks endanger airlines more than terrorism, say expertsarticle(04/2011)
- Mobiles to play key role in national cyber defence article(04/2011)
- Israel government unveils counter-cyberterrorism unit article(04/2011)
- The Asymmetrical Online War article(04/2011)
- Israel planning strategy to defend computer networks from attack article(04/2011)
- Dot-Mil Cyber Security Spending: Now Extra FUBAR article(04/2011)
- Experts see rising threat of cyberattacks in U.S. article(04/2011)
- Nationales Cyber-Abwehrzentrum nimmt Arbeit auf article(04/2011)
March/11
- What a cyberwar with China might look like article(03/2011)
- Defense funding for cybersecurity is hard to pin down article(03/2011)
- FBI to Conduct Joint Cyber Investigations With China article(03/2011)
- Critical U.S. infrastructure: "There's always a way in. article(03/2011)
- Why Defense in Depth Will Never Be Sufficient article(03/2011)
- Chinese Cyberwar Attacks Canadian and Australian Governments article(03/2011)
- RUSI Defence Systems - Issue article(03/2011)
- Chinese Cyberwar Attacks Canadian and Australian Governments article(03/2011)
- Japan's Nuclear Crisis, Stuxnet and SCADA Defenses article(03/2011)
- A cyber strike hits European Parliament, yet there is no confirmation on whether it was related to the EC attacks. article(03/2011)
- EastWest Institute pioneers internal trust in cyberspace article(03/2011)
- Cyber security costs $1m a week to keep data safe article(03/2011)
- As the Worm Turns: The Stuxnet Legacy article(03/2011)
- BreakingPoint Unveils Simulated Cyber Operations and Unified Training article(03/2011)
- Cyber Warfare Decomposition... Fail article(03/2011)
- Massive Cyber Attack Targets European Institutions Before EU Summit article(03/2011)
- Confronting the Cyber Threat article(03/2011
- Former NSA, CIA Director Says Cyber Information Too Secretive article(03/2011
- Dozens of exploits released for popular SCADA programs article(03/2011)
- Cyber Command Pursues 'Defensible' IT Architecture article(03/2011)
- Poland to support NATO multinational cyber defence initiative article(03/2011)
- Former NSA, CIA Chief: Declassify Cyber Vulnerabilities article(03/2011)
- Cyberwar -- Indien rekrutiert Hacker zur Selbstverteidigung article(03/2011)
- Some say a code word in Stuxnet refers to... Queen Esther? article(03/2011)
- Cyber Conflict and State Power article(03/2011)
- Cyber Task Force Eyes Power Grid article(03/2011)
- Iran: Ministry of Intelligence steps up Activities as Opposition Demonstrations Resume article(03/2011)
- Germany's Cyber-War Intensifies article(03/2011)
- Time to rethink the cyber defense equation article(03/2011)
- AUSTRALIAN GOVT REVEALS NEW CYBERSPOOKS UNIT article(03/2011)
- Report: Iran's paramilitary launches cyber attack article(03/2011)
- Cyber Warfare Semantics - Can't We All Just Get Along? article(03/2011)
- DHS wants $233.6 million to deploy Einstein 3 system article(03/2011)
- Malware Attacks Decline In SCADA, Industrial Control Systems, Report Says article(03/2011)
- China's cyber abilities worry US - spy chief article(03/2011)
- Mikko Hypponen: a Q&A on botnets and cybersecurity article(03/2011)
- N.Korea Trains Up Hacker Squad article(03/2011)
- Cyberwar and defense against it article(03/2011)
- The new cyber arms race article(03/2011)
- Cyber attack on France targeted Paris G20 files article(03/2011)
- Cyber-attacks now the most feared EU energy threat article(03/2011)
- US and Israel were behind Stuxnet claims researchers article(03/2011)
- Time is Not Right for a Cyberspace Treaty article(03/2011)
- Could Iran Be Using Stuxnet to Confuse the West? article(03/2011)
- Lockheed Martin Adds More C4ISR Systems Into Airborne Intel Lab article(03/2011)
- Northrop Grumman Awarded Contract To Provide Cyberspace Operations Solutions To The US Navy article(03/2011)
- Schneier on cyberweapons, offensive cyberwar capabilities article(03/2011)
- If Stuxnet was act of cyberwar, is the U.S. ready for a response? article(03/2011)
- On Cyberwar with China, and other recent publications article(03/2011)
- Schneier on cyberwar definition: Is there an arm's race? article(03/2011)
- Stuxnet Report II: A Worm's Life article(03/2011)
- A Declaration of Cyber-War article(03/2011)
- Chinese hackers targeted Morgan Stanley in 2009 article(03/2011)
February/11
- Cyberspace Wars article(02/2011)
- Rise of the Cyber Militias article(02/2011)
- Cybersecurity and Cyber Freedom: The Future of Digital Surveillance Technology article(02/2011)
- Cyberspace article(02/2011)
- The cyberweapon that could take down the internet article(02/2011)
- Schmidt Aide Moves to State as Cyber Chief article(02/2011)
- Cyberwar Issues Likely to Be Addressed Only After a Catastrophe article(02/2011)
- The Too-Many Faces of 'Cyberwar' article(02/2011)
- Defining cyber warfare article(02/2011)
- European Nations Prepare for Cyber-Attack article(02/2011)
- Dutch Government to Design Cyber Defense Doctrine article(02/2011)
- Your gas meter: The new frontline in cyberwar article(02/2011)
- NATO Builds Its Cyberdefenses article(02/2011)
- "Cyber war" Between Iran's Regime and Opposition-Supporting Western Media article(02/2011)
- Analysis: Prepare for cyber war. But what does it mean? article(02/2011)
- Cyberspace Wars By JOSEPH S. NYE Jr. article(02/2011)
- Homeland Security seeks major boost in cybersecurity funds article(02/2011)
- Iran to take pre-emptive action against cyber terrorism: general article(02/2011)
- Schmidt Aide Moves to State as Cyber Chief article(02/2011)
- Cybersecurity: Laws Only Go So Far article(02/2011)
- How Hackers Could Exploit Federal Government Shutdown article(02/2011)
- Cyberdeterrence and Cyberwar -- article(02/2011)
- Cyber defense -- U.S. cybersecurity must-do's article(02/2011)
- Iran to unload fuel from Bushehr nuclear plant article(02/2011)
- Kontrollnetze und Netzkontrollen -- Regierungen beeinträchtigen zunehmend die Entwicklung des weltweiten Datennetzes article(02/2011)
- Cyberwar PsyOps Analysis: Egypt 2011 article(02/2011)
- Cyberwar PsyOps: e-Activism and Social Media article(02/2011)
- Die neue Cyber-Sicherheitsstrategie für Deutschland und das Tabuwort … ENTNETZUNG article(02/2011)
- "Gegen fremde Geheimdienste machtlos" -- CYBER-ABWEHR-ZENTRUM article(02/2011)
- Stuxnet Report: A System Attack article(02/2011)
- NATO Nations to boost cyber defence cooperation article(02/2011)
- Nato creates cyber-defence command article(02/2011)
- CYBERWAR -- Wenn Staaten hacken -- Was sagt das Völkerrecht zu Cyber-Angriffen auf einen Staat? article(02/2011)
- U.K. rethinking cyber security article(02/2011)
- Young AFCEANs Meeting - Die dunkle Seite der vernetzten Welt article(02/2011)
- Wie Cyberangriffe im Netz funktionieren article(02/2011)
- U.S. enables Chinese hacking of Google article(02/2011)
- Cybercrime Outlook 2020 article(02/2011)
- Cyber attacks to replace bombings? article(02/2011)
- Cyber battle: the morning after article(02/2011)
- Carnegie Mellon University Study: Insider Threat Taxonomies article(02/2011)
- NSA and DoD Warn of Destructive Cyber Attacks article(02/2011)
- So, Why Does the Air Force Want Hundreds of Fake Online Identities on Social Media? [Update] article(02/2011)
- Iran's Right to Cyber Self Defense article(02/2011)
- RSA: Cyber War Mass Hysteria Is Hindering Security article(02/2011)
- Stuxnet had a full bag of tricks, report says article(02/2011)
- Targeted attacks, IPv6 complicate cyber defense article(02/2011)
- NSA chief wants to protect 'critical' private networks article(02/2011)
- Black ops: how HBGary wrote backdoors for the government article(02/2011)
- Kybernetische Krieger werden überschätzt article(02/2011)
- RSA: Defining cyberwar is just as hard as fighting it article(02/2011)
- Israel video shows Stuxnet as one of its successes article(02/2011)
- Cyber war threat exaggerated claims security expert article(02/2011)
- Report: Iran recovered quickly from cyber-attack on nuclear plant article(02/2011)
- U.S. Preparing Cyberwar Strategy Before Threat Grows article(02/2011)
- Why we need cooperation in cyberspace? article(02/2011)
- White House Advisor: Use of Term Cyberwar "Terrible" article(02/2011)
- Stuxnet expert: other sites were hit but Natanz was true target article(02/2011)
- Low Intensity Conflicts - Virtual Small Arms Proliferation article(02/2011)
- Air Force Official: Yes to Retaliation in Cyberspace article(02/2011)
- Trend to watch: Formal relationships between governments and hacker article(02/2011)
- Könnte ein Angriff auf das Routing-Protokoll das gesamte Internet lahmlegen? article(02/2011)
- Nationales Cyber-Abwehrzentrum -- Internet-Wacht am Rheinarticle(02/2011)
- About CyberWar, Deterrence, and Espionage article(02/2011)
- Stuxnet and the hacker non-sense article(02/2011)
- Cyber war dominates the landscape at RSA conference article(02/2011)
- Schwartz says he will protect cyber mission article(02/2011)
- Updated W32.Stuxnet Dossier is Available article(02/2011)
- Report: Stuxnet Hit 5 Gateway Targets on Its Way to Iranian Plant article(02/2011)
- Schwartz says he will protect cyber mission article(02/2011)
- Opinion: Time for a Geneva Convention on cyberwar article(02/2011)
- Spy chief: Cyber war is 'battleground of future' article(02/2011)
- Chinese hackers infiltrated five energy firms: McAfee article(02/2011)
- The Changing Security Battlefield article(02/2011)
- 'Chinese cyberspies' target energy giants article(02/2011)
- Cyberwar - Neusprech article(02/2011)
- POLITOLOGE ANDREAS SCHMIDT ÜBER CYBERWAR - "Erkältung ist nicht die schwarze Pest" article(02/2011)
- IBM Launches Initiatives to Help Secure the Exploding World of Connected Devices article(02/2011)
- U.S.-China Cyber War Scenario in the Eyes of a Chinese Student article(02/2011)
- Secret China war plan: trillions in U.S. debt Commentary: Today an economic battle; later, combat article(02/2011)
- Cyber War Rules of Engagement Report based on Geneva Convention article(02/2011)
- Cyber-Activism and Cyber-War Spotlighted at Panda Security's Third Annual Security Blogger Summit article(02/2011)
- Cyberwar - Mythos und Realität--Byte-Piraten article(02/2011)
- U.S. Military Can Restore a Country's Internet - Whether It Likes It or Not article(02/2011)
- Secret China war plan: trillions in U.S. debt article(02/2011)
- Hackers target NI Department of Finance phone network article(02/2011)
- Merkel: Cyberwar so gefährlich wie klassischer Krieg article(02/2011)
- India wants rules of cyber 'war' defined article(02/2011)
- Study considers the Geneva Convention in cyberspace article(02/2011)
- U.S. Navy Selects Integrators to Evaluate Four Competitive Cyber-Warfare Concepts article(02/2011)
- UK Cyberwar - or UK Cyberwallies? article(02/2011)
- Wir müssen mal über Krieg reden...article(02/2011)
- Attackers' Subtle Markets Manipulation Could Tilt Global Economies article(02/2011)
- Chinese cyber-spies penetrate Foreign Office computers article(02/2011)
- Hackers Penetrate Nasdaq Computers article(02/2011)
- What Could Possibly Go Wrong: Industrial Cyber-Sabotage article(02/2011)
- NSA Fear Puts Focus on Access Control article(02/2011)
- World leaders meet to discuss cyberwar rules of engagement article(02/2011)
- America's power grid too vulnerable to cyberattack, US report finds article(02/2011)
- Cyberwar or cybermirage? article(02/2011)
- Eine Genfer Konvention für die digitale Welt article(02/2011)
- Hacker attackieren Deutschland im Sekundentakt article(02/2011)
- Cyber War, Insurrections and Elections article(02/2011)
- China's Active Defense Strategy and Its Regional Impact article(02/2011)
- UK decides to opt in to EU-wide cyber security plan article(02/2011)
- "Rules of engagement" proposed for cyber warfare article(02/2011)
- Mubarak's Digital Dilemma: Why Egypt's Internet Controls Failed article(02/2011)
- 'Brutal' cyber war raging article(02/2011)
- Cybersecurity Two Years Later article(02/2011)
- "Cyberwar" nicht mehr nur Science-Fiction-Szenario article(02/2011)
- Hackers Shut Down Government Sites article(02/2011)
- Proposal for cyber war rules of engagement article(02/2011)
- Israeli official sees cyber alternative to "ugly" war article(02/2011)
- Stuxnet virus penetrates nuclear plant, may cause Chernobyl-like disaster article(02/2011)
- USA setzen auf Cyber-Abwehrsystem article(02/2011)
January/11
- US oil industry hit by cyberattacks: Was China involved? article(01/2011)
- Navy Eyes Fighting in Cyberspace article(01/2011)
- Russia calls for NATO probe into Iran cyber strike article(01/2011)
- Navy Short of Tools to Detect, Nab Cyberintruders article(01/2011)
- Is Israel Already at War With Iran? article(01/2011)
- Feds' Smart Grid Race Leaves Cybersecurity in the Dust(old artilce from 2009) article(01/2011)
- The Cyberwar Debate: Enough With The Straw Men And Scaremongers article(01/2011)
- The 3 Essential Components of Effective Cyber Warfare Strategyarticle(01/2011)
- Stuxnet returns to Bushehr reactor. Russia warns of nuclear explosion article(01/2011)
- Stuxnet is not Superworm, researcher says article(01/2011)
- AP Exclusive: Intel warns of Iran nuke disaster article(01/2011)
- 'Stuxnet' worm could cause 'Chernobyl-like disaster' in Iran, intel assessment warns article(01/2011)
- BdK Internationale Stabilisierungseinheit mit Fähigkeiten im cyberspace? article(01/2011)
- Security and Defense: Digital strike article(01/2011)
- What do business security and national cyberwar defence have in common? article(01/2011)
- Was ist der Cyberwar? article(01/2011)
- Cyberattacks on infrastructure are the 'new normal' article(01/2011)
- How Egypt Cut Off the Internet (and How a U.S. 'Kill Switch' Might Work) article(01/2011)
- Exclusive: Tunisia Internet Chief Gives Inside Look at Cyber Uprising article(01/2011)
- This Week at War: Lessons from Cyberwar I article(01/2011)
- Beware the Cyber War Boomerang? article(01/2011)
- NATO's Cyber Partners article(01/2011)
- Dragon Week: Information Warfare in the Information Age article(01/2011)
- We May Not Be Facing a Full-Scale Cyber War, But The Battle Rages On article(01/2011)
- Experts Weigh in on Cyber War Report article(01/2011)
- ISA-99: Manufacturing and Control Systems Security website
- Building a Cyber secure plant article(01/2011)
- Infrastructure must withstand shock of cyberattacks article(01/2011)
- Is retaliation the answer to cyber attacks? article(01/2011)
- Obama needs to address our cyber-warfare gap with China article(01/2011)
- Cyberwar Case Study: Georgia 2008 article(01/2011)
- Apocalypse in Cyberspace? It's Overdone article(01/2011)
- Turkey to conduct cyber attack drills article(01/2011)
- Software [In]security: Cyber Warmongering and Influence Peddling article(01/2011)
- Ready for Cyberwar? via Brian Krebs article(01/2011)
- Keine Angst vorm Cyberwar article(01/2011)
- Cyber attacks halt emissions trading in European carbon markets article(01/2011)
- Trojan weapons instead of missiles article(01/2011)
- Scientists Decry Cyberwar as Governments Respond article(01/2011)
- Iran Expanding "Cyber Army" to Patrol Cyberspace article(01/2011)
- Cyber-attack did not affect Iran nuclear programme: official article(01/2011)
- Wer stoppt die Cyberkrieger? article(01/2011)
- Note to the OECD: OK, it may not be Total Cyberwar yet, but it's not exactly "Peace in Our Time" either, is it? article(01/2011)
- Stuxnet Mitigation article(01/2011)
- Lame Stuxnet worm 'full of errors', says security consultant article(01/2011)
- SCADA exploit - the dragon awakes article(01/2011)
- Black Hat puts 'offense' on its cyber agenda article(01/2011)
- The US Needs To Learn To Limit-Not Win-A Cyber War article(01/2011)
- North Korea's Red Star OS takes the 'open' out of 'open source' article(01/2011)
- What Stuxnet is all about via R. Langner article(01/2011)
- Why Stuxnet Isn't Just About Siemens' PLCs via R. Langner article(01/2011)
- UK, Australia enter 'cyber partnership' article(01/2011)
- Cyberwar--As likely as a visit from E.T. article(01/2011)
- Cyberwar: Reality or Exaggeration? article(01/2011)
- CSC Awarded $30 Million Cybersecurity Contract for U.S. Air Force article(01/2011)
- Cyberwar hype is obscuring real security threats article(10/2010)
- Found this in October 2010!--Stuxnet: An Amateur's Weapon--via darkreading article(01/2011)
- New info on Stuxnet via F-SECURE article(01/2011)
- Relax, there's little chance of cyber war or cyber catastrophe article(01/2011)
- The New York Times Fails To Deliver Stuxnet's Creators article(01/2011)
- Risks of cyber war 'over-hyped' says OECD study article(01/2011)
- Iran's nuclear program and a new era of cyber war article(01/2011)
- OECD study: an actual cyberwar is improbable article(01/2011)
- February 3: Security Blogger Summit on cyber-activism and cyber-war in Madrid article(01/2011)
- Iran responds to Stuxnet by expanding cyberwar militia article(01/2011)
- IT Security Researchers at ISU Combat Cyber war article(01/2011)
- Putin Orders Russian Move to GNU/Linux article(01/2011)
- Aaviksoo: Estonian cyberdefence is held in high regard in US article(01/2011)
- Britain's military chief says he wants his own version of the Pentagon's Cyber Command article(01/2011)
- China's US$90B ups cyberwar stakes article(01/2011)
- Utah's NSA spy center will house data, not analysts article(01/2011)
- Team of ISU researchers combats cyber warfare article(01/2011)
- Das ist doch gar kein Krieg Dr.Sandro Gaycken article(01/2011)
- Hired Guns: What's in the name CyberPMC or CyberPSC? article(01/2011)
- Who will be to blame for the loss of a cyberwar? article(01/2011)
- In cybercrime war, military projects can be game changers article(01/2011)
- Stuxnet for Nobel Peace Prize article(01/2011)
- Estonia Forms Volunteer Cyber Army article(01/2011)
- Funding the new Home Guard to protect against cyber attacks article(01/2011)
- Stuxnet Infection On Over 10,000 Indian Computers: Symantec article(01/2011)
- Homeland Security Details Critical Infrastructure Protection Strategy article(01/2011)
- New Botnet: Storm Signal? article(01/2011)
- Cross Site Identification - or - How your social network might expose you when you least expect it article(01/2011)
- Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors article(01/2011)
- Volunteer Cyber Army Emerges In Estonia article(01/2011)
- Mazzaglia: Cyber war in the new year article(01/2011)
- Chinese hackers dig into new IE bug, says Google researcher article(01/2011)
- Stuxnet Variants Will Wreak Havoc on More Information Systems in 2011 article(01/2011)
- Operational security goes digital article(01/2011)
- Sweden has central role in cyber warfare article(01/2011)
December/10
- Attacks on Junta-related Sites Slowing Burma's Internet article(12/2010)
- Beiträge zur Internationalen Politik & Sicherheit [NATO] article(12/2010)
- Report strengthens suspicions that Stuxnet harmed Iran's nuke plant article(12/2010)
- Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? Preliminary Assessment article(12/2010)
- WikiLeaks Spurs MoD To Step Up Cyber Defences article(12/2010)
- The Political Power of Social Media article(12/2010)
- SAS man to take charge of cyber-warfare defences article(12/2010)
- In cyber wartime, the best defence is... software integrity! article(12/2010)
- NSA Switches to Assuming Security Has Always Been Compromised article(12/2010)
- Cyberwar: Enemy Needn't Be a Nation-State article(12/2010)
- Book Review:Cyber War: The Next Threat to National Security and What to do About It by Richard Clarke and Robert Knake, HarperCollins, 2010. article(12/2010)
- The cyberwar will not be streamed article(12/2010)
- Senior general to take charge of cyber-warfare defences article(12/2010)
- New corps' mission to parry cyberthreat article(12/2010)
- Richard Stiennon: Cyber War Has Already Happened article(12/2010)
- China Likely Behind Stuxnet Attack, Cyberwar Expert Says article(12/2010)
- Stuxnet? Bah, That's Just the Beginning article(12/2010)
- Stuxnet Is the World's Problem article(12/2010)
- Stuxnet apparently as effective as a military strike article(12/2010)
- NATO Forms Cybercoalitions, New Realms of Defense article(12/2010)
- Stop calling it a cyber war, you dummy article(12/2010)
- Cablegate: Aussie spies spooked by cyberwar article(12/2010)
- Stuxnet Worm Revealed - Installation, Injection and Mitigation article(12/2010)
- Are states unleashing the dogs of cyber war? article(12/2010)
- The Dogs of Cyber War Visualized article(12/2010)
- WikiLeaks: Case Study for Cyberwar? article(12/2010)
- Sikorski: Poland will join the Centre in 2011 article(12/2010)
- Navy activates real-time view of networks article(12/2010)
- Cyber security command on cards in India article(12/2010)
- Cybercrime, Cyberwars, Cyberterrorism and Hacktivism - Part 1 article(12/2010)
- Stuxnet's Finnish-Chinese Connection article(12/2010)
- What if Operation Anonymous Attacked City Infrastructures & Power Grids? article(12/2010)
- 'Stuxnet virus set back Iran's nuclear program by 2 years' article(12/2010)
- Sicherheitsforscher: Im Internet sind USA den Aktivisten unterlegen - Sorge um Freiheit im Netz article(12/2010)
- Cyber-warfare: Smart Grid Offers a New Hacker Playground article(12/2010)
- Cyberwar? What Cyberwar? article(12/2010)
- 10 days after Pakistan hacking attack, CBI website not accessible article(12/2010)
- The Shadow War article(12/2010)
- Wanted: More Computer Security and Cyber Attack Students article(12/2010)
- China and its Double-edged Cyber-sword article(12/2010)
- Shadow Elite: Should We Believe Chertoff On Cyber-War? article(12/2010)
- Some Thoughts on the Iranian Cyber Army and what they mean to Cyber article(12/2010)
- Chinese hired Blaster worm hackers article(12/2010)
- US embassy cables: China uses access to Microsoft source code to help plot cyber warfare, US fears article(12/2010)
- Covert war against Iran's nuclear aims takes chilling turn article(12/2010)
- WikiLeaks cables reveal fears over Chinese cyber warfare article(12/2010)
- India and Pakistan in massive cyber war article(12/2010)
- Covert war against Iran's nuclear aims takes chilling turn article(12/2010)
- Bruce Schneier: We need 'cyberwar hotlines' to match nuclear hotlines article(12/2010)
- China Touts Drive to Target Hackers article(12/2010)
- Chinese army must deal with cyberwarfare: state media article(12/2010)
- Cyberespionage At A Crossroads article(12/2010)
- DHS to Conduct Wireless Security Audits article(12/2010)
- Forget 2012: The World Will See a Cyber War in 2015 article(12/2010)
- Talk of Cyber War: What is It Good for? Absolutely Nothing, Experts Say article(12/2010)
- Battling Cyber Threats article(12/2010)
- With Russia In Assange's Sights, Is He In Theirs? article(12/2010)
- Demilitarizing cybersecurity article(12/2010)
- GCHQ technology 'could be sold article(12/2010)
November/10
- Wikileaks cable is not confirmation that China attacked Google article(11/2010)
- Nuclear scientist killed in Tehran was Iran's top Stuxnet expert article(11/2010)
- Wounded Iran nuclear scientist named in UN list article(11/2010)
- WikiLeaks cable: Russian leadership viewed Lieberman as 'one of its own' article(11/2010)
- Chinese government hacked Google, claims Wikileaks leaked US diplomatic cables article(11/2010)
- Understanding the Internet's insecure routing infrastructure article(11/2010)
- ANALYSIS: Is Stuxnet the new weapon for cyber insurgents? article(11/2010)
- Chinese cyber spies target British defense official article(11/2010)
- DHS Cybersecurity Center Promotes Information Sharing article(11/2010)
- The Korean Cyberwar --The Cybernaut article(11/2010)
- Brits declare war on Stuxnet. Americans say: Use it on North Korea article(11/2010)
- Stuxnet? Let's stop being scared of shadows article(11/2010)
- Iran denies Stuxnet disrupted its nuclear programme article(11/2010)
- The European Commission has presented a set of new EU measures covering security, including proposals for greater cyber space protection. article(11/2010)
- Critical briefing on attacks against industrial control systems article(11/2010)
- United States is ill-prepared for a cyberwar, former adviser says article(11/2010)
- Stuxnet Virus 'Warheads" Could Knock Out Iran's Utility Systems article(11/2010)
- Hedge Fund Manager Predicts Cyber Attack Will Shut Down NYSE in 2011 article(11/2010)
- «Stuxnet war ein weltweiter Waffentest» Interview mit Sandro Gaycken-- article(11/2010)
- Should Obama's 'internet kill switch' power be curbed? article(11/2010)
- Cyberwar rhetoric cash-grab for military firms article(11/2010)
- Enough With the Warnings! article(11/2010)
- Remarks by Secretary Gates at the Wall Street Journal CEO Council 2010 Meeting (Interesting part [crtl+f] > cyberwar ) article(11/2010)
- 'Scary stuff': Cyberattack arrest highlights risk article(11/2010)
- Cyberattacks Down as U.S. Boosts Systems Security article(11/2010)
- UK concentrating on developing cyber "weaponry" article(11/2010)
- Who was Gareth Williams? article(11/2010)
- North Korea: Are alarm bells ringing? article(11/2010)
- Could Stuxnet Mess With North Korea's New Uranium Plant? article(11/2010)
- Assessment of the Origins of the Stuxnet malware article(11/2010)
- EU, US and NATO to Work Together on Cyber Defense article(11/2010)
- Stuxnet may be part of Iran atom woes: ex-IAEA aide article(11/2010)
- Lisbon Summit Declaration (number 40.) article(11/2010)
- Cyber-terrorism: Defending the country's online borders article(11/2010)
- National Agency of Public Registry was awarded four prizes at the GITI Awards 2010 article(11/2010)
- U.S.: Beijing backs hacking on 'massive scale' article(11/2010)
- Britain urged to lead international debate on cyber warfare article(11/2010)
- NATO gears up for cyber warfare with latest exercise article(11/2010)
- ''Cyber Coalition 2010'' to exercise collaboration in cyber defence article(11/2010)
- Iranian Cyber Army Hacks Website Of Farsi1article(11/2010)
- Netcat Power Tools article(11/2010)
- Proceedings of the SCADA Security Scientific Symposium 2007 article(11/2010)
- Cybersecurity: Can Policy Keep Up with the Pace of Technical Change?article(11/2010)
- CyberWar -- Si Vis Pacem, Para Bellumarticle(11/2010)
- STUXNET Worm has changed the security game article(11/2010)
- On Halloween (October 31st) the U.S. Cyber Command (USCYBERCOM) went live article(11/2010)
- Korea attacks force DDoS bunker creation article(11/2010)
- NATO mobilises for cyber warfare article(11/2010)
- Cyberwar? China hijacks US government and military web traffic article(11/2010)
- Computers as Weapons of War article(11/2010)
- Partisanen im Cyberspace article(11/2010)
- Focus.com Launches Expert Media Roster article(11/2010)
- West's spies aim at rising powers article(11/2010)
- China's Internet Hijacking Uncovered article(11/2010)
- After stuxnet, nuclear watchdog could gain computer security rolearticle(11/2010)
- Cyber Defense and NATO: An Attack on One, an Attack on All? article(11/2010)
- U.S. sees "huge" cyber threat in the future article(11/2010)
- China Hijacked 15% of US Internet Traffic-and no one noticed article(11/2010)
- Cyber Command Prepares for High-Tech War Crimes: "Computer Network Attacks to Protect U.S. Interests" article(11/2010)
- Cyber Risk Report article(11/2010)
- Aussie forces ready, but cyberwar is chaff article(11/2010)
- Why Cyber Security is Important article(11/2010)
- Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic article(11/2010)
- The Gray Lines Between Reconnaissance, Espionage and Cyberwar article(11/2010)
- Is North Korea poised to revolutionize cyber warfare? article(11/2010)
- Taipei City: National Security Bureau website a major target for hackers article(11/2010)
- Who Can Protect Us From Major Cyber Attacks? article(11/2010)
- Our Government Can't Prevent A Digital 9-11: Entrepreneurs Need To Step In article(11/2010)
- Stuxnet: A Breakthrough [STUXNET] article(11/2010)
- Cyber threat, warfare center opening article(11/2010)
- Britain needs cyber attack capability article(11/2010)
- Congresswoman says chance of cyber attack against electric grid is 100% article(11/2010)
- In the cyber war a networked laptop has the power of a missile article(11/2010)
- Cyber attacks have moved to political & nationalistic stage: Websense 2010 Threat Report article(11/2010)
- Air Force CIO Priorities: Networking At Mach 6 article(11/2010)
- The Drone Wars article(11/2010)
- Cyber-War article(11/2010)
- Iran's Citizen Cyber Warriors article(11/2010)
- Defence minister says UK must win cyber security fight article(11/2010)
- Should We Prepare for a Cyber War? A Response to Seymour Hersch article(11/2010)
- Der CyberKrieg - A new unit of the German army signals the arrival of the age of cyber war article(11/2010)
- Defending against the cyber threat article(11/2010)
- Cyberwar Vs. Cybercrime - Assessing the Feds' Priorities in Battling the Bad Guys article(11/2010)
- Cyber Command (CYBERCOM) Reaches Full Operational Capability--The command has a budget of about $120 million this year, and is scheduled to receive approximately $150 million in fiscal 2011.-- article(11/2010)
- Minister of Defense Calls for International Cyber-War Rules article(11/2010)
- Countering Cyber Terrorism With Social Networks article(11/2010)
- DDoS Attacks Disable Human Rights Groups Websites article(11/2010)
- On a (Cyber) War Footing --DDOS as a political weapon-- article(11/2010)
- Attack Severs Burma Internet article(11/2010)
- Europe simulates total cyber war article(11/2010)
- Report: NKorea hacking into SKorean gov't networks increases ahead of G-20 summit in Seoul article(11/2010)
- Neubauer Program in Cyber Warfare -- The Joseph and Jeanette Neubauer Foundation, Philadelphia, PA, US article(11/2010)
- U.S. Cyber Command A Wild Card at Fort Meade article(11/2010)
- SCADA System's Hard-Coded Password Circulated Online for Years article(07/2010)
- Iran cleaning all Stuxnet-infested PCs article(11/2010)
- UK nuke station denies Stuxnet shutdownarticle(11/2010)
- Defense in depth: building a holistic security infrastructure article(11/2010)
OCTOBER/10
- Hackers shut down Saudi education ministry website article(10/2010)
- Cyber Security Federal Government: Threats article(10/2010)
- The Race to Build a Secure Operating System article(10/2010)
- Why Stuxnet was developed by the Israelis article(10/2010)
- Microsoft Exposes Scope of Botnet Threat article(10/2010)
- 3rd International Conference on Cyber Conflict article(10/2010)
- 460th Space Wing wraps up first Cyber Lightning exercise article(10/2010)
- Should U.S. be worried about a cyber war with China? article(10/2010)
- Cyber-war: A note on the NATO summit in Lisbon. article(10/2010)
- Estonian NATO cyber center keeps an eye on the Internetarticle(07/2009)
- All Governments, the Company must prepare for Cyberwar
- Analysis: Cyber defenders, attackers probe Stuxnet's secrets article(10/2010)
- Stuxnet: Hack of the Century article(10/2010)
- Mobilizing in the Fifth Domain article(10/2010)0
- Cyberwar: few rules govern a growing global threat article(10/2010)
- Cyberwars: Already Underway With No Geneva Conventions to Guide Thems article(10/2010)
- Current threats and the evolution of cybercrime article(10/2010)
- Conventional wars are being replaced in computer age by access on control as cyber war methodologies have become much more sophisticated, writes ASGHAR JAVED article(10/2010)
- SCADA Vendors Still Need Security Wake Up Call article(10/2010)
- Internet Security & Cyber Warfare Now Part of Air Force Manual article(10/2010)
- Cyber Success Demands DHS and Pentagon Get Along article(10/2010)
- Kaspersky admitted its site was hacked this week, so we exclusively speak to the UK MD to grill him on what went down and what is happening now. article(10/2010)
- Air Force manual describes shadowy cyberwar world article(10/2010)
- Open source cloud alternative article(10/2010)
- Govt plans to cut internet services in case of cyber attacks article(10/2010)
- Hackers "hidden chain" Government network article(10/2010)
- Cape Town 2010, China, and Cybersecurity article(10/2010)
- USB Warfare: The Real Electronic Nightmare article(10/2010)
- Pentagon seeks tight ties with cyber contractors article(10/2010)
- Government to allocate £500m for cyber defence article(10/2010)
- Cyberwar and surveillance article(10/2010)
- Stuxnet: An Amateur's Weapon article(10/2010)
- Pentagon Will Help Homeland Security Department Fight Domestic Cyberattacks article(10/2010)
- Cyber Pressure on Iran article(10/2010)
- Cyber attacks and terrorism among top threats to UK article(10/2010)
- Cyber warfare has arrived article(10/2010)
- Strategic defence review to prioritise cyber security article(10/2010)
- Director GCHQ, Iain Lobban, makes Cyber speech at the IISS article(10/2010)
- Cyber Shield U.S. to NATO: 3-Tier System Needed article(10/2010)
- Cyber, Not Cypher by THOMAS RID article(10/2010)
- Stuxnet logbook, Oct 15 2010, 1100 hours MESZarticle(10/2010)
- US Readies Cyberwar, Virtual Flag Terrorism article(10/2010)
- How Stuxnet Is Rewriting the Cyberterrorism Playbook interview(10/2010)
- Stuxnet and the Pentagon's Cyber Strategy article(10/2010)
- Former White House advisor urges action on 'cyber sanctuaries' article(10/2010)
- UK says it gets hit by 1,000 cyber attacks monthly article(10/2010)
- Why It's Hard to Crash the Electric Grid article(10/2010)
- Cyber warfare in the cloud article(07/2010)
- RSA Europe: Defend against cyberwar by re-architecting networks, not buying more technology, says Richard A. Clarke article(10/2010)
- Europe's Information Society Newsroom article(10/2010)
- Cyber Warfare Needs Cyber Civil Defense article(10/2010)
- Ralph on cyberwar: War 0.1 article(10/2010)
- Chinese Cyber Warriors - It's On! article(10/2010)
- US to Launch CYBERCOM as Fifth Sphere of War Takes Shape article(10/2010)
- The North American Electric Reliability Corporation's (NERC) mission is to ensure the reliability of the North American bulk power system. website
- Pentagon Partners With NATO To Create Global Cyber Warfare System article(10/2010)
- The secret cyber war between India and China accelerates article(10/2010)
- EU Agency analysis of 'Stuxnet' malware: a paradigm shift in threats and Critical Information Infrastructure Protection article(10/2010)
- N. Korea believed to have 200,000 special warfare troops: S. Korean estimate article(10/2010)
- Australian military reveals 230% increase in cyber attacks in 2010 article(10/2010)
- Who controls the internet? article(10/2010)
- Adrift In Cyberspace article(10/2010)
- EU calls Stuxnet 'paradigm shift' as U.S. responds more mildly article(10/2010)
- Cyber espionage besieges militaryarticle(10/2010)
- Pentagon Partners With NATO To Create Global Cyber Warfare System article(10/2010)
- Cyberattack Becomes More Sophisticated article(10/2010)
- Iran Cyberwar: "Stuxnet"came from Russian supplier article(10/2010)
- Security and Defense: Nuclear worming article(10/2010)
- Security: Stuxnet Worm: Nine Facts Every IT Security Pro Should Know article(10/2010)
- NATO Faces More than Defense Challenges as Cyber Threats Grow article(10/2010)
- From Targets of Opportunity to Ground Zero article(10/2010)
- US Cyber Command dashboard article(10/2010)
- Has The Threat of Cyberwar Been Grossly Exaggerated? article(10/2010)
- Army Cyber Command stands up article(10/2010)
- Who runs the Internet? article(10/2010)
- Cyberattacks Penetrating Key Fields article(10/2010)
- Lights Out: US Smart Grid Vulnerable to Hackers around the World article(10/2010)
- The Cyber Arms Race article(10/2010)
- The Story Behind The Stuxnet Virus article(10/2010)
- Hacking the Industrial Network article(04/2010)
- Canada's Cyber Strategy Vague, Too article(04/2010)
- Don't Stick It In The dangers of USB drives. article(10/2010)
- Security Brass Must Prepare For Cyber, N-Wars: Kalam article(10/2010)
- The Stuxnet Attack, and its Mystery article(10/2010)
- Building Backdoors Into Computer Chips article(10/2010)
- Dutch multinationals under attack from Stuxnet worm article(10/2010)
- Going Cyber Against Nuke Program article(10/2010)
- US call for Nato cyber-strike capacity causes division article(10/2010)
- Cyberwarfare is here article(10/2010)
- Special report: The Pentagon's new cyber warriors article(10/2010)
- Iran: Stuxnet Part of Western Sabotage Campaign article(10/2010)
- Pentagon: The global cyberwar is just beginning article(10/2010)
- Rethinking Stuxnet READ THIS article(10/2010)
- Stuxnet logbook, Oct 6 2010, 1130 hours MESZ [UPDATE] [STUXNET] article(10/2010)
- U.S. Cyberwar Strategy: The Pentagon Plans to Attack article(10/2010)
- Cybersecurity as a Catalyst for Economic Growth article(10/2010)
- Stuxnet could hurt world economic development, says Microsoft CEO [STUXNET] article(10/2010)
- Super virus hits 6 million computers in China [STUXNET] article(10/2010)
- Going Cyber Against Nuke Program article(10/2010)
- NATO faces more than defense challenges as cyber threats grow article(10/2010)
- Foreign Affairs LIVE: The Pentagon's New Cyberstrategy article(10/2010)
- October Is National Cybersecurity Awareness Month article(10/2010)
- Cyberwar Hype Intended to Destroy the Open Internet article(10/2010)
- Russian experts flee Iran, escape dragnet for cyber worm smugglers article(10/2010)
- Iran arrests 'nuclear spies,' intelligence chief says article(10/2010)
- Cyber warriors could see less time at sea article(10/2010)
- Army establishes Army Cyber Command article(10/2010)
- Stuxnet Speculation Fuels Crackdown By Iranian Intelligence [STUXNET] article(10/2010)
- Column one: The lessons of Stuxnet [STUXNET] article(10/2010)
- Can you Survive a Massive Cyber-attack? article(10/2010)
- Wesley Clark Discusses Cyber Warfare and an InZero Systems Solution on Weekend TV Talk Show article(10/2010)
- Israel's unit 8200: cyber warfare article(10/2010)
- Who Wants a Cyberwar? --THIS IS GOOD WORK___ article(10/2010)
- Cyber war out of virtual world article(10/2010)
- Stuxnet worm theories point to inside job [STUXNET] article(10/2010)
- Stuxnet continues to be a hot topic. Here are answers to some of the questions we've received. [STUXNET] article(10/2010)
- Millions of Computers Hit by Virus Across China [STUXNET] article(10/2010)
- Inside Stuxnet: Researcher drops new clues about origin of worm [STUXNET] article(10/2010)
SEPTEMBER/10
- The meaning of Stuxnet-- A sophisticated "cyber-missile" highlights the potential-and limitations-of cyberwar [STUXNET] article(09/2010)
- In a Computer Worm, a Possible Biblical Clue [STUXNET] article(09/2010)
- Stuxnet strikes China [STUXNET] article(09/2010)
- CYBERCOM won't be fully operational by Friday deadline article(09/2010)
- The shape of threats to come article(09/2010)
- Stuxnet Worm: Art of Cyber Warfare [STUXNET] article(09/2010)
- Stuxnet 'much more sophisticated than Aurora' article(09/2010)
- Did The Stuxnet Worm Kill India's INSAT-4B Satellite? [STUXNET] article(09/2010)
- Stuxnet Sux or Stuxnet Success Story? [STUXNET] article(09/2010)
- Richard Clarke and Michael Chertoff to address RSA Europe 2010 article(09/2010)
- Singapore seeks volunteers to beef up cyberdefense article(09/2010)
- U.S. testing defenses with simulated cyberattack article(09/2010) and the DHS's Cyber Storm III Fact Sheet(2010)
- Israeli Attack On Syrian Reactor, Template For Iran Attack? article(09/2010)
- 6 mysteries about Stuxnet [STUXNET] article(09/2010)
- Cyber-War Gets Real, and a Beltway Brawl Begins article(09/2010)
- U.S. Mounting First Test of Cyber-Blitz Response Plan article(09/2010)
- EXCLUSIVE-Cyber takes centre stage in Israel's war strategy article(09/2010)
- Brazilian Army To Get Cyberwarfare Training and Security Support from Panda Security article(09/2010)
- Iran struggling to contain 'foreign-made' computer worm [STUXNET] article(09/2010)
- Cyber Storm III aims to protect against real thing -- 13 nations unify for exercise article(09/2010)
- A Silent Attack, but Not a Subtle One [STUXNET] article(09/2010)
- Stuxnet mutating, rampaging through Iran [STUXNET] article(09/2010)
- Detailed timeline of STUXNET from Siemens [STUXNET] article(09/2010)
- Stuxnet: Future of warfare? Or just lax security? [STUXNET] article(09/2010)
- No government defence against cyber attacks article(09/2010)
- Defense lacks doctrine to guide it through cyberwarfare article(09/2010)
- Cyber Hearings Wrap-Up: Uncertain Road toward Secure Zone--"one of the most critical problems our country faces," head of the U.S. Cyber Command Gen. Keith Alexander-- article(09/2010)
- Cyberwar Chief Calls for Secure Computer Network article(09/2010)
- Five Reasons "dot-secure" Will Fail article(09/2010)
- Worm hits computers of staff at Iran nuclear plant article(09/2010)
- Kibersoldaty ready for battle article(09/2010)
- Stuxnet: The Trinity Test Of Cyberwarfare [STUXNET]article(09/2010)
- Warriors in the battle for cyberspace article(09/2010)
- FACTBOX - What is Stuxnet? [STUXNET]article(09/2010)
- Electricity Grid in U.S. Penetrated By Spies article(09/2010)
- Exclusive Interview with Indian Cyber Army (Indishell) article(09/2010)
- Iran Confirms Stuxnet Damage To Nuclear Facilities [STUXNET] article(09/2010)
- Iran Fights Malware Attacking Computers article(09/2010)
- Alexander Details U.S. Cyber Command Gains article(09/2010)
- Bush White House security adviser: Israel likely source of cyber attack on Iran [STUXNET] article(09/2010)
- Cyberwar Chief Calls for Secure Computer Network article(09/2010)
- Possible Israeli Cyber Attack Sabotaged Iran's Bushehr Nuclear Reactor [STUXNET] article(09/2010)
- A laundry list of power industry incidents to learn from article(09/2010)
- Vulnerabilities lurk in the soft(ware) underbelly of combat networks article(09/2010)
- China's Emerging Cyberwar Doctrine article(09/2009)
- A new enemy: the hackers could damage the Ukrainian business (some mistakes in the translation) article(09/2010) (via@Google Translate)
- Why can't India have its own 'patriotic hackers'? article(09/2010)
- ENISA & European Schoolnet - new prize for teaching of online safety in schools -- This should minimize Botnets because the people will learn how to surf and whats happening behind their icons-- This is a good perspective for the future article(09/2010)
- NATO has already stood-up their Cyber Incident Response Center and there are plans to bring it to full operational capability shortly. website
- Is US proposal for a NATO cyber shield practical? -- The Cold War concepts of shared warning apply in the 21st century to cyber security. Just as our air defenses, our missile defenses have been linked so too do our cyber defenses need to be linked as well", Lynn was quoted" article(09/2010)
- Stuxnet malware is 'weapon' out to destroy ... Iran's Bushehr nuclear plant? [STUXNET] article(09/2010)
- Companies and governments should prepare for cyberwar, say experts article(09/2010)
- Was Stuxnet built to attack Iran's nuclear program? [STUXNET] article(09/2010)
- How to plan an industrial cyber-sabotage operation: A look at Stuxnet [STUXNET] article(09/2010)
- Stuxnet: A Users' Guide to Industrial Sabotage [STUXNET] --related papers-- article(09/2010)
- After the incident in the japanese ocean Japan is afraid of cyberattacks from China-- Japan suspects its defence ministry ... article(09/2010)
- New spy rootkit targets industrial secrets Windows virus takes aim at Siemens SCADA management systems [STUXNET] article(09/2010)
- Siemens: Stuxnet worm hit industrial systems [STUXNET] article(09/2010)
- Stuxnet logbook, Sep 16 2010, 12.00 hours MESZ [STUXNET] --"The problem is not Stuxnet. Stuxnet is history," said Langner in an e-mail message. "The problem is the next generation of malware that will follow."-- article(09/2010)
- Cyber-Warfare: U.S. Military Hackers and Spies Prepare to Knock the World Offline article(09/2010)
- Former NSA Chief Hayden: Cybersecurity Policy Still 'Vacant' article(09/2010)
- Lynn Briefs North Atlantic Council on Cybersecurity article(09/2010)
- Post-Event Cyber Deterrence By Denial? article(09/2010)
- Pyongyang has been interested in computer technologies for almost two decades. In the mid-1990s, North Koreans assigned to the United Nations ... article(09/2010)
- US urges NATO to build 'cyber shield' article(09/2010)
- State Of Cybercrime Legislation Around The World article(09/2010)
- Lynn discusses Cybersecurity with NATO Allies article(09/2010)
- The cyberwar daily news is a compilation of social network news, newspaper articles and statements of people NEWSPAPER (for free)
- Hydraq (Aurora) Attackers Back? article(09/2010)
- Cyber Arms Intelligence Report for September 13th article(09/2010)
- Chinese Cyber Warfare Advance in Quantum Teleportation article(09/2010)
- Analysis: Cybersecurity bill on list for passage this year article(09/2010)
- Cyber security a growing concern in energy sector article(09/2010)
- Hamadoun Touré, secretary-general of the U.N. International Telecommunications Union (ITU), has called for a comprehensive "cyber treaty" that would have a built-in legal and
regulatory framework, as well as cross-continent contingency plans in the event of large-scale cyberattacks . article(09/2010)
AUGUST/10
- White House security advisor on preparing for cyberwar--Richard Clarke thinks government should take a lead role in defending from attack article(08/2010)
- JP 3-13 defines Information Operations (IO) as - "the integrated employment of electronic warfare, computer network operations, psychological operations, military deception, and
operations security, in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision making while
protecting our own." article(08/2010)
- Cyber culture change-- The new US Cyber patriotism? Want the US-Army the same cyber warrior infrastructure like the Chinese? article(08/2010)
- Emerging cyber doctrine replays the CT/COIN debate article(08/2010)
- Richard Clarke: Preparing For A Future Cyberwar article(08/2010)
- China policy could force foreign security firms out-- Protectionism? article(08/2010)
- "Detecting campaigns enables resilient detection and prevention mechanisms across an intrusion, and engages CND responders earlier in the kill chain, reducing the number of
successful intrusions. It should be obvious, but bears repeating that a lack of specific indicators from a single intrusion prevents identification of key indicators from sequential
intrusions." article(08/2010)
- Build an army of cyber warriors--UMUC programs can help America face new generation of threats article(08/2010)
- Cheap cyber weapons (e.g., computer viruses) will neutralize expensive kinetic weapons (e.g., missile defenses). article(04/2010)
- EU cyber assault would cost €86 million, expert says article(08/2010)
- ".. But the air force has recruited some of these elite software engineers, and eventually loses most of them to the civilian economy."article(08/2010)
- India realizes the need of cybersecurity article(08/2010)
- U.S. military wants to exert influence over private cyber infrastructure article(08/2010)
- Defending the Internet: National Security v. Big Brother-- "... military spying on everything in the interest of national security or spying on nothing to preserve freedom and
liberty--an effective defense of US digital interests is best served by public and private sector interests working cooperatively" article(08/2010)
- India Is Developing Cyber War Capabilities article(08/2010)
- ''Many people haven't quite realised yet how the cyber world will be a principal field of warfare,'' with the potential to ''thwart the kinetic advantageof large military
forces.'' Mr Irvine said. article(08/2010)
- According to the report, which was authored by Deputy Secretary of Defense William Lynn, the attack began after an infected flash drive was inserted into a U.S. military laptop at
a base in the Middle East. article(08/2010) related
article(08/2010)
- Cyber Security: A Complex "Web" of Problems-- one American team from DoD actually attacked and destroyed a Web site that another agency of government, the CIA, had created and was
using. article(08/2010)
- Don't Stick It In article(08/2010)
- "... power grids are a normal target for guerrillas and militaries. It's something they usually try to attack if they get into a conflict," James Lewis, a senior fellow at the
Center for Strategic and International Studies, said in an interview last week. article(08/2010)
- To prevent attacks, will the Pentagon have to cut itself off from the online world? article(08/2010)
- Government could install embassies in key countries, such as U.S., China, and Russia, enabling communication with appropriate authorities in other countries during a cyber crisis
article(08/2010)
- Huawei of China, sells critical equipment to America's closest allies in Europe and Asia article(08/2010)
- Do Norway and NATO understood how great the threat really is? article(03/2010)
- On the other hand, destroying it in an adversary's network in another country may cross a line, and officials are trying to articulate a clear policy for such preemptive cyber
activity. article(08/2010)
- "Low-threat worm caused 'most significant breach' of U.S. military net" article(08/2010)
- Panel: U.S. lacks legal framework to fight in cyberspace--She said cyber war is likely to be analogous to the current fight against terrorism, which does not conveniently fit
current laws... article(08/2010)
- 2007th The idea was offered in Küberkaitseliidu (KKL) has come to create a phase in which a considerable number of non-organized volunteers are oriented Cyber Defense League
subunits. article(06/2010)
- The Chinese internet is a bid educational platform to learn hacking-- "The hacking scene can be chaotic," James A. Lewis, senior fellow for cybersecurity and Internet policy at
the Center for Strategic and International Studies, says. "There are many actors, some directed by the government and others tolerated by it. These actors can include civilian
agencies, companies, and individuals." article(03/2010)
- "It was not only that Japanese users insulted Koreans in this case, but insulted Koreans further when they declared Kim Yu Na's gold medal was earned because she bribed the
judges. The Sankei newspaper in Japan claims confusion on" article(08/2010)
- "If the AV cos won't regulate themselves then we need Government standards, to establish minimum protections. We can't depend on the honesty of AV Cos." article(08/2010)
- "There are seven computer network warfare tactics: IT products can be hidden damage potential process" article(08/2010)
- "The Twilight Of Network-Centric Warfare"- "When a Defense Business Board task force recommended last month that the Office of the Secretary of Defense (OSD) eliminate its
networking and information integration secretariat, it signaled just how far from grace the notion of network-centric warfare has fallen." article(08/2010)
- "The 'cyberwar' between India and Pakistan has claimed another victim, with the hacking of a high-profile lawmaker's website that experts say highlights the woeful lack of
Internet security in South Asia." article(08/2010)
- Attack Statistics of the InZero Hackers Challange--Just to watch the activity in some kind of challenge over world-- article(08/2010)
- "New victim in India-Pakistan 'cyberwar'" article(08/2010)
- Interesting page for information warfare and cyber war article(08/2010)
- The national states are trying to get the hackers involved in their work with special conditions: "IT workers and ethical hackers who sign up for the ambitious project will be
protected by law, says the proposal being discussed by senior government administrators." article(08/2010)
- "Secretary of State Hillary Clinton strongly suggested that attacks on allied cyber and energy infrastructures should be reconsidered attacks under Article 5 of the NATO Charter,
declaring that" article(08/2010)
- Cyber Command still struggling to define cyber war article(08/2010)
- WOW Such a detailed article(08/2010) is not always in the net
- "Defense review panel opens debate over federal cyber roles"-"A panel chartered by Congress to review long-term threats to the United States has reopened a hotly contested debate
on how the government should counter cyberattacks by calling for the Defense Department to expand its authority by defending all federal" article(08/2010)
- "U.S. Challenged By Global Cybersecurity"--The governments also in the USA are realizing that in cyberspace a lot of work has to be done!-- article(08/2010)
- Cybersecurity Is Evolving, Increasingly Important--Gen. Keith B. Alexander figures out some good points for the future of cyberwar! article(08/2010)
- Cyber Attacks on Business - A National Security Threat?--The picture is not a computer for buisness operations, but the text tries to figure out the possible problems article(08/2010)
- How chinese wikipedia colect information about cyberwar and cyber warfare!--You have to use google translate--article(08/2010)
- "Public gives approval for cyber warfare" article(08/2010)
- "Rules? In Cyberwar? No Rules!"--The fiction that war, any kind of war, can be fought with rules is one of those eternal scams that make war possible, generation after generation,
millennia after millennia....--Hard statement ! comment(08/2010)
- "Security Specialists Support Cyberwarfare"--Indeed, why not just rent a botnet?-- Attribution will be the holy goal in cyber warfare!article(08/2010)
- "The recurring use of the Cold War as analogy for cyberwar is not well thought out. At Black Hat last week..."article(08/2010)
JULY/10
- "Fog of cyberwar: internet always favors the offense"--Be careful with the term cyber war! There are problems but think twice before you over react!-- "You guys made the cyber
world look like the north German..."--"You're going to build the rivers and hills into the web. You're going to create geography that is going to help the defense."-- article(07/2010)
- U.S. military cyberwar: What's off-limits?article(07/2010)
- You know something about NSPD54?
- "Black Hat: U.S. Infrastructure Vulnerable To Cyber Attack"-- You ever hear the name EINSTEIN 1/2/3? NO?; then read
this article to get more information-- article(07/2010)
- "Estonia shines light on reality of cyber threats"--only the end is interesting-- article(07/2010)
- Stuxnet sniffs information for a possible attack on power plants or other critical infrastructures which Supervisory Control And Data Acquisition (SCADA) system article(07/2010)</</p>
- Cybersecurity camp part of a nationwide effort to train 10,000 experts--Can we protect our infrastructures when our citizens have secured PCs which cannot be used by botnets?
Would attribution possible? article(2010) Also the UK tries to find new hackers for their defense ans offense in cyberspace? article(07/2010)
- Fighting Wars in Cyberspace-- A good analysis of strategie problems and maybe some old ideas of solving them-- "Whether two dimensions or five, the underlying rhythms of warfare
remain the same."article(07/2010)
- "Cyberwar Is Hell"--comment on attribution and other problems--article(07/2010)
- SHOULD WE SEEK CYBER ATTRIBUTION?--a positive statement for technologies which could traceroute a cyber attack--national security over public anonymity? article(07/2010)
- Defending the Power Grid is Defending the Nation article(07/2010)
- Have private companies the right to fight cyberattacks?-- This have to be discussed in the future because this problem can interferre state and private sector action! This could
be very dangerous in aspects of internationl law. article(07/2010)
- "...security experts say that the country[china] has been developing its Internet warfare capabilities over the past decade and is now a world leader."--This statement is not easy
to verify because the information about the chinese cyberarmy and their resources are marginal. article(07/2010)
- "India's Black Cobras launch Cyber War against Pakistan" article(07/2010)
- This comment is interesting because it gives a positive idea of the future of cyberspace. We will find rules to solve this problems. We have to develop rules together, because the
internet is a "globalthing" and so it is neccessary that we try to find a global resolution. comment(07/2010)
- The attribution problem in cyberspace is one of the biggest problems in this complicated kind of warfare.("North Korea 'not responsible' for 4 July cyberattacks") article(07/2010)
- Iran's Hidden Cyberjihad article(07/2010)
- Cyber Command lays groundwork for rapid deployment of resources article(07/2010)
- "The Air Force Association's innovative high school cyber security competition has new corporate sponsors..." article(07/2010)
- "Chinese Military Behind Google, Other Cyberattacks." article(07/2010)
- Containing Cyberwar The international community needs a coordinated response to new threats article(07/2010)
- About the cyber center in Estonia and other ideas article(07/2010)
- This blog-article shows some of the main discussions around the cyberwar threats How can we handle it? Is there a cyberwar out in the cyberspace? The comments in this blog show
how controversial the discussion is. article(07/2010)
- "Cyber Warfare Creates New Opportunities in Middle East"--A potentielle threat brings a lot of money into the playground-- article(07/2010)
- This comment tries to show that the argumentation of the people who do not think cyberattacks exists are wrong! look at VRT-sourcefire-blog comment(07/2010)
- "U.S. Plans Cyber Shield for Utilities, Companies" article(07/2010)
- "Is there a cyber threat?" asked Virgina in a the VRT-sourcefire-blog! Read the article(07/2010)
- "Lewis: Cold War lessons of limited value for cyber attack deterrence"--Some very interesting aspects of cyber detterence and protection-- This article explains a lot of problems
of cyberattacks ("... while a cyber counterstrike could have unanticipated effects in a networked environment, causing damage in an unpredictable manner in countries that might not be
in, or even near, a target country, Lewis writes." article(07/2010)
- "Repeat of SKorea, US cyberattacks does no damage"--Cyberwar exists but it could be handled with sophisticated analysis and strategy(fingerprinting, tracerouting) article(07/2010)
- (Mr. S. Gopalkrishnan, CEO and Managing Director of the India based IT Firm Infosys) "India faced a severe threat last April which was an unknown attack from the hackers. It is
believed that..." comment(07/2010)
- Bruce Schneier wrote a article about the hype of cyberwar in the media. He declares that there is a threat but we have to stop exaggerating
the cyberwar threat because a solution for this problem would not be found in fear. article(07/2010)
- Cyber Warfare Asia Pacific 2010 is a new conference in Asia --probably interesting for the future in Asia article(07/2010)
- Also India will focus cyber warfare in their national security. article(07/2010)
- The Russian ring charged this week with spying on the United States faced some of the common security problems that plague many companies article(07/2010)
- The Economist wrote interesting facts article(07/2010)
- More information about the cyberspace command article(07/2010)
- Hackers attacked a serbian website and changed the frontpage article(07/2010)
June/10
- Report about cyber warfare and the US-Chinese relation in the future --cyberwar dimension(5th)-- article(06/2010)
- "We are now in a world in which cyber ..."(Panetta) short comment
(06/2010)
- New Cyber warfare Center(Annapolis, Md) article(06/2010)
- article(06/2010)
- Some calculations about cyberattacks and the costs of them. This calculations could not be copied into state costs because the influences will be more destrucablearticle(06/2010)
- The NewYorkTimes published information about the attribution problem in cyberwarfare and the new problems which occure with this attribution problem. This text is a good summary
of the current situation in politics, law and army. article(06/2010)
- Interesting new information about the training program of the cyber-elite in the USA. article(06/2010)
- DARPA has some problems with the NCR(National -Cyber-Range) because they are to slow. "Battle For Cyber-Range: Military Dumps Darpa" There are
other services which want their own playground to test their cyber weapons. article(06/2010)
comment
- BBC reports about the cyber war conference in Tallinn article(06/2010)
- Informations about the NATO Conference in Tallinn and the future of cyberwarfare article(06/2010)
- For Google, DNS log analysis essential in Aurora attack investigation. aricle(06/2010)
- Pakistani server used to hack Indian Army officer's computer article(06/2010)
- CISCO released some news about security. article(06/2010)
- Tehran's Lost Connection. Is the Iranian regime's cyberwar with the United States real, or a paranoid delusion? article(06/2010)
- Richard A. Clarke wrote the book "Cyber War: The Next Threat to National Security and What to Do About It" and explains the new problems we could have when all the systems will
crash. A lot of the scenarios are not quiet possible but some other should be recogniced. One point is the risk in cyberspace with insecure systems which can be compromised from
enemies. Clarke declares that Microsoft is one of these risk points in the cyberspace. This article(06/2010) explains some facts about critical infrastructures
and the use of Microsoft.
- Keith Alexander explains how the U.S. will fight espionage and crime. article(06/2010)
- Big cyber warfare conference in Tallinn. Experts will discuss the new problems of cyber warfare and the consequences for the NATO and other allies.article(06/2010)
- South Korea is again under the attack of hackers(only in German)article(06/2010)
- Dr. Prescott Winter Begins Asian Cyber Threat and Risk Tour article(06/2010)
- New/Old discussion: The old challenge of providing public safety while also protecting civil liberties has found a new manifestation in the cyber age. article(06/2010)
- How much know Bradley Manning and how much access he had to the secret information connections between the diplomats. article(06/2010)
- China taking actions to beef up cyber security. All states have to face the new problems with cyber security. article(06/2010)
- NATO is considering the use of military force against enemies who launch cyber attacks on its member states. article(06/2010)
- Better Warning system against attacks article(06/2010)
- U.S. Backs Talks on Cyber Warfare article(06/2010)
- U.S. faces remote sabotage cyber danger: general article(06/2010)
- Cyber Command chief says military computer networks are vulnerable to attack article(06/2010)
- Lieberman Bill Gives Feds 'Emergency' Powers to Secure Civilian Nets article(06/2010)
MAY/10
- This article(05/2010) is about the new Cyber Command in the US Army.
- White House Cyber Czar: 'There Is No Cyberwar article(03/2010)
- The US is in the process of creating a unified cyber command, to fight the wars of the future article(03/2010)
- U.S. Cyber Command: Waging War In World's Fifth Battlespace article(05/2010)
- EADS partnership with Khalifa University of Science, Technology and Research targets cyber security skills gap. article(05/2010)
- Interesting article about critiacal infrastructures and the Canadian Forces which try to protect these
infrastructures.
- The DARPA do research on new technologies for safer communication on the internet. article(05/2010)
- "US appoints first cyber warfare general". This NEWS were released via gulli or via the observer (05/2010).
- This article discuss the problem of communication and information networks
during a cyberattack or a natural disaster.
- Should a targeted country strike back at the cyber attackers? article(05/2010)
APRIL/10
- The U.S. has not fully developed policies on how to respond to cyberattacks that are routed through neutral countries or the computers of innocent Americans. article(04/2010)
- The German Bundesnetzagentur tries to develop a intelligent electric network with new devices. Also known as "smart grid! article (05/2010). This was also planned by the US Government. This topic
is also interesting for Cyber deterrance and Cyber warfare article(10/2009)
- CBC NEWS report that the Canadian Government isn't prepared for an cyber-attack. article (05/2010)
- Chinese Information and Cyber Warfare by Daniel Ventre article(04/2010)
- Gulli NEWS released an article
(04/2010) which explains the new security strategy of GOOGLE after the attacks on their mail accounts and their servers.
- The Shadowserver Foundation released a new paper (04/2010) which tries to explain the methods of the attackers. A big part of the paper makes conclusions with cloud computing and the risks of cloud
computing.
- Dr. Sandro Gaycken released a new paper which tries to prove that the argumentation
of Matthew Sklerov in the military law review is naive and the consequences of this thesis are dangerous.
- The future of IPv6 will be interesting for
the control of the computer network
- An new analysis (05/2010) of Conficker, Downup, Downandup, Conflicker and Kido. This worm is in the
interests of the national states because it influences a lot of personal computers and is strangely quiet.
- Interesting news about the the creation of the military's first headquarters of cyberwarfare article
(09/2009)
- "China school denies link to Google attack: report". The network of BlackHat hackers and the chinese government is unproofenarticle(02/2010)
- Global Offensive Snagged Corporate, Personal Data at nearly 2,500 Companies; Operation Is Still Running article(02/2010)
- White House declassifies outline of cybersecurity program. article(03/2010)
- We must prepare for cyber conflict - but not forget wars we fight todayarticle(02/2010)
- A very long article which explains the whole cyberwar plan(not classified) of the US Army article(2009)
- Cyber Conflict: The Modern Gold Rush Gary Clayton and Kevin Coleman note the critical absence of rules of the engagement governing digital attack and defense-- article(05/2009)
- This article is a summary of the Cybersecurity Enhancement Act of 2009 article(02/2007)
- Some hackers shut down a power grid.article(01/2008)
- Israel suspected of 'hacking' Syrian air defences article(10/2009)
- "Cyber Conflict Attribution and the Law"--This article is on my list for my bachelor degree! comment(08/2006)
- Do we need a U.N. cybersecurity council?--An independent research group calls for an international body to deal with cyber threats, conflicts article(08/2009)
+-+-+-+-+-+-+-+-+-+-+-+-+
|s|t|u|d|y|4|c|y|b|e|r|p|e|a|c|e|
+-+-+-+-+-+-+-+-+-+-+-+-+